[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

US7965861B2 - Methods and systems for digital image security - Google Patents

Methods and systems for digital image security Download PDF

Info

Publication number
US7965861B2
US7965861B2 US11/740,742 US74074207A US7965861B2 US 7965861 B2 US7965861 B2 US 7965861B2 US 74074207 A US74074207 A US 74074207A US 7965861 B2 US7965861 B2 US 7965861B2
Authority
US
United States
Prior art keywords
image
sequence
embedding
bit
segments
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US11/740,742
Other versions
US20080130883A1 (en
Inventor
Sos S. Agaian
David Akopian
Ravindranath C. Cherukuri
Juan Pablo Perez
Benjamin M. Rodriguez
Ronnie R. Sifuentes, Jr.
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Texas System
Original Assignee
University of Texas System
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Texas System filed Critical University of Texas System
Priority to US11/740,742 priority Critical patent/US7965861B2/en
Assigned to THE BOARD OF REGENTS OF THE UNIVERSITY OF TEXAS SYSTEM reassignment THE BOARD OF REGENTS OF THE UNIVERSITY OF TEXAS SYSTEM ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PEREZ, JUAN PABLO, AKOPIAN, DAVID, SIFUENTES, RONNIE R., JR., CHERUKURI, RAVINDRANATH C., AGIAN, SOS S., RODRIGUEZ, BENJAMIN M.
Publication of US20080130883A1 publication Critical patent/US20080130883A1/en
Priority to US13/134,062 priority patent/US8369568B2/en
Application granted granted Critical
Publication of US7965861B2 publication Critical patent/US7965861B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C5/00Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0078Robust watermarking, e.g. average attack or collusion attack resistant using multiple thresholds
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0051Embedding of the watermark in the spatial domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness

Definitions

  • the present invention relates generally to image processing. More particularly, the present disclosure relates to methods for encrypting digital images.
  • the present disclosure provides a novel steganographic algorithm for different image models, and in particular, embedding secure data in a layer of a host image.
  • the algorithm may embed secure data within a best embeddable region of a layer (e.g., a selected color layer, a significant bit layer, etc.).
  • the algorithm may provide an option of selecting the best color models for embedding purposes. This achieves introducing higher embedding capacity with less distortion as compared to conventional techniques.
  • the algorithm may provide the use of a complexity measure for cover images in order to select the best of the candidate layers for the insertion of the steganographic information.
  • a cover or host image may be decomposed into several color layers.
  • the image may be converted into several color layers using, for example, the following color models: RGB (red, green, blue), YCbCr (luminance, chrominance blue, chrominance red), YIQ (luminance, intensity, chrominance) HSV (hue, saturation, value), CMY (cyan, magenta, yellow), CMYK (cyan, magenta, yellow, black), and/or other documented color models.
  • the image may be decomposed using a best color model for a given image and secure data.
  • the embeddable regions may be selected.
  • a layer or multiple layers are chosen from the selected model.
  • the layer(s) identified by the measure as the key color within the image are selected for embedding. It is noted that the color layer may vary with different images and color models.
  • the selected embeddable layer may be categorized into non-overlapping embeddable or non-embeddable regions.
  • the identified region may further be categorized for the measured upper boundary of the maximum capacity in bits that can be altered without causing perceptual differences.
  • the embedding procedure takes place in the selected regions which may include multiple layer bit planes. Subsequently, a color reduction development step may be performed.
  • the algorithm may embed secure data in a least significant bit layer of a host image (e.g., a digital carrier 8-bit grayscale or 24-bit color imagery). Areas of high noise resemblance may be detected using a measure gauge local variation. Digital message (e.g., secure data) may be hidden by modifying the least bit layers of best host pixels. Subsequently, computational processes may be incorporated to retain the statistical structure that is associated with the host image. A first order stego capacity measurement may be taken, which enables an optimal selection of the parameters to be applied during the embedding process. This measurement may evaluate the approach taken and gives a resultant value which may depict the affects of the embedding process from a root mean square error and first order statistical point of view.
  • a host image e.g., a digital carrier 8-bit grayscale or 24-bit color imagery. Areas of high noise resemblance may be detected using a measure gauge local variation. Digital message (e.g., secure data) may be hidden by modifying the least bit layers of best
  • a host image may be processed and analyzed according to the variation measurement.
  • a stego file may be acknowledged and an extraction tag is formed to enable an extraction and reconstruction of the received stego image.
  • the stego image may be converted into a binary string and a threshold selection process may be performed based on, for example, the size of the stego file to be embedded and/or the values dictated by a first-order stego capacity measurement (FOSCM).
  • the selected threshold process may ensure an even distribution of stego information upon the host image and may select.
  • the threshold value may provide security from different types of detection processes.
  • the data from the first stage may be forwarded to a second stage which embeds the secure data.
  • the embedding process may occur simultaneously with a histogram retention algorithm used for statically or dynamically updating record of occurring events in the embedding process. This may reduce the first-order statistical modifications. For example, if the insertion of the secure data requires changing of the value of the original pixel in the host image, the occurrence is noted. Simultaneously, every time a change in an original pixel is required, the records are queried and the pixel is modified to a value that may counteract any previous changes.
  • This step is possible due to the fact that, when a pixel value must be changed, there may be a lower pixel value and a higher pixel value that will reflect the desired bits in the least significant values. A tag may subsequently be inserted, resulting in a host image ready for transmission.
  • the algorithm may decompose a digital media or signal into its binary format representation.
  • a pseudo noise sequence may be generated using for example, M-Sequence, gold codes, chaotic, and the like.
  • the decomposed digital media or signal may be encrypted using, for example, the pseudo noise (Pn) sequence.
  • Pn-sequence matrix may be generated by segmentation of the pseudo noise sequence.
  • the encryption method/system includes the steps of converting an image into a binary bit stream; transforming the binary bit stream into binary vector; and segmenting binary vector into various segments.
  • the compression method/system includes the steps or generating a random sequence (for example M-sequence, gold codes, etc.); developing a code matrix based on the random sequence; determining the distance measure between code matrix and each segmented binary vector, generating a key based on the distance measure. Combine all the keys generated and append the keys used to segmenting and random sequence generating to obtain a compressed and encrypted image.
  • a random sequence for example M-sequence, gold codes, etc.
  • Any encryption technique made on the image decreases the redundancy, making the method/system suitable for use in compressing encrypted images.
  • this method/system may be used to compress noise like signals, represent any multi-media data (e.g., images, audio, video, and other media sources).
  • This method/system may be applied for any application that requires authentication, data integrity, data confidentiality, and data security.
  • the digital media or signal may be reconfigured with respect to pseudo noise sequence generated. Subsequently, the digital media or signal may be correlated and applied to a logical operation between two selected columns of the Pn-sequence matrix to generate a sequence close to or equivalent to the segmented media.
  • the steps of segmentation and configuration may be repeated with a new sequence shift code and a selected column of Pn-sequence matrix until a maximum estimate of the original digital media or signal is completed.
  • the algorithm may subsequently be recombined by reassembling the binary formats of the shifts codes to generate a new compressed image.
  • the compressed image may be decomposed into its binary stream presentation.
  • a Pn-sequence may be generated using information encrypted into the compressed image.
  • a Pn-sequence matrix may be generated by segmentation of the Pn-sequence. Using two columns of the Pn-sequence matrix, a correlation of logical operations may be used to retrieve sequence closer to the digital media or signal. The original digital media may be retrieved by randomizing the digital media or signal with respect to pseudo noise sequence generated if it was reconfigured initially.
  • the algorithm may be implemented on a processor, where the processor may be any computer-readable media known in the art. For example, it may be embodied internally or externally on a hard drive, ASIC, CD drive, DVD drive, tape drive, floppy drive, network drive, flash drive, USB drive, or the like.
  • the processor is meant to indicate any computing device capable of executing instructions for receiving the data from amongst other functions.
  • the processor is a personal computer (e.g., a typical desktop or laptop computer operated by a user).
  • the processor may be a personal digital assistant (PDA) or other handheld computing device.
  • PDA personal digital assistant
  • the processor may be a networked device and may constitute a terminal device running software from a remote server, wired or wirelessly.
  • Input from a user, detector, or other system components may be gathered through one or more known techniques such as a keyboard and/or mouse.
  • Output if necessary, may be achieved through one or more known techniques such as an output file, printer, facsimile, e-mail, web-posting, or the like.
  • Storage may be achieved internally and/or externally and may include, for example, a hard drive, CD drive, DVD drive, tape drive, floppy drive, network drive, USB drive, flash drive, or the like.
  • the processor may use any type of monitor or screen known in the art, for displaying information.
  • a cathode ray tube (CRT) or liquid crystal display (LCD) can be used.
  • CTR cathode ray tube
  • LCD liquid crystal display
  • One or more display panels may also constitute a display.
  • a traditional display may not be required, and processor may operate through appropriate voice and/or key commands.
  • a method for producing a compressed and encrypted image is provided.
  • An image may be converted into a binary bit stream, and the bit stream may be decomposed into a plurality of segments (of a fixed length and/or various lengths).
  • a binary sequence based on a first key may be generated and may be used to generate a code matrix.
  • a distance between the code matrix and the distance may be determined for each of the plurality of segments.
  • a compressed and encrypted image may be obtained.
  • a compressed image of a cover image may be provided.
  • the cover image may be converting the cover image into a binary bit steam.
  • the bit streams may be decomposed into a plurality of segments (e.g., the plurality of segments having various lengths).
  • each of the plurality of segments may be classified using a redundancy of bits based on a first key to generate a plurality of redundant and non-redundant segments.
  • the redundant segments and non-redundant segments may be compressed.
  • the non-redundant segments may be compressed with low redundancy based on a second key.
  • the combination of the compressed redundant and non-redundant segments may form the compressed image of the cover image.
  • substantially is defined as being largely but not necessarily wholly what is specified as understood by one of ordinary skill in the art, and in one-non-limiting embodiment, substantially and its variations refer to ranges within 10%, preferably within 5%, more preferably within 1%, and most preferably within 0.5% of what is specified.
  • Coupled is defined as connected, although not necessarily directly, and not necessarily mechanically.
  • a step of a method or an element of a device that “comprises,” “has,” “includes” or “contains” one or more features possesses those one or more features, but is not limited to possessing only those one or more features.
  • a device or structure that is configured in a certain way is configured in at least that way, but may also be configured in ways that are not listed.
  • FIG. 1 show various bit plane decomposition and a Least Significant Bit (LSB) plane, in accordance with embodiments of the disclosure.
  • LSB Least Significant Bit
  • FIG. 2 shows a flow chart of a time domain data hiding technique, in accordance with embodiments of the disclosure.
  • FIGS. 3A through 3C show images used for embedding secure data, in accordance with embodiments of the disclosure.
  • FIG. 4 shows a general overview of Pseudo Noise Sequences, in accordance with embodiments of the disclosure.
  • FIG. 5 shows a flow chart for encoding cover signal or data using Pseudo Noise Sequence into a compressed signal or data (‘Simple Pn-sequence encoder’), in accordance with embodiments of the disclosure.
  • FIG. 6 shows a flow chart for decoding compressed data using Pseudo Noise Sequence to reconstruct the cover signal or data (‘Simple Pn-sequence decoder’), in accordance with embodiments of the disclosure.
  • FIGS. 7A through 7C are various images used in an analysis, in accordance with embodiments of the disclosure.
  • FIG. 8 shows a bit plane decomposition of the red layer of FIG. 7C , in accordance with embodiments of the disclosure.
  • FIG. 9 shows a bit plane decomposition of the red layer of FIG. 7C represented using a M-sequence, in accordance with embodiments of the disclosure.
  • FIG. 10 shows an embedding method, in accordance with embodiments of the disclosure.
  • FIG. 11 shows selecting number of bits to embed based on level of variation, in accordance with embodiments of the disclosure.
  • FIGS. 12A and 12B show corruption of first-order statistics, in accordance with embodiments of the disclosure.
  • FIGS. 13A and 13B show results of parameter selection, in accordance with embodiments of the disclosure.
  • FIG. 14 shows relationship of parameter selection and number of available pixels, in accordance with embodiments of the disclosure.
  • FIGS. 15A through 15J show test image, in accordance with embodiments of the disclosure.
  • FIGS. 16A and 16B show graph results of First-Order Stego Capacity Measure, in accordance with embodiments of the disclosure.
  • FIG. 17 shows an embedded method, in accordance with embodiments of the disclosure.
  • FIGS. 18A and 18B show noise detection, in accordance with embodiments of the disclosure.
  • FIGS. 19A and 19B show threshold level settings, in accordance with embodiments of the disclosure.
  • FIGS. 20A and 20B show exponential relation between threshold and available pixels, in accordance with embodiments of the disclosure.
  • FIGS. 21A and 21B show test image, in accordance with embodiments of the disclosure.
  • FIG. 22 shows a plot of histogram difference using adaptive embedding methods, in accordance with embodiments of the disclosure.
  • FIGS. 23A through 23D show histogram difference of Stego images with 10% information, in accordance with embodiments of the disclosure.
  • FIGS. 24A through 24D show histogram difference of Stego images with 80% information, in accordance with embodiments of the disclosure.
  • FIGS. 25A and 25B show histograms, in accordance with embodiments of the disclosure.
  • FIGS. 26A through 26C show comparison histograms after embedding of 80%, in accordance with embodiments of the disclosure.
  • FIG. 27 shows a table calculation of FOSCM measure to find a best coverage image, in accordance with embodiments of the disclosure.
  • FIG. 28 show embeddable areas within an image and a detailed view of allowable altered bits (highlighted) within a block.
  • the left thumbnail shows the natural block and the right shows the highlighted areas, in accordance with embodiments of the disclosure.
  • FIG. 29 shows a structure of palette based images, in accordance with embodiments of the disclosure.
  • FIG. 30 includes the root mean square error (RMS) values obtained by comparing different clean images with their corresponding stego images while embedding 6 k of data.
  • RMS root mean square error
  • FIG. 31 contains the root mean square error (RMS) values obtained by comparing different clean images with their corresponding stego images while embedding 6 k of data.
  • RMS root mean square error
  • Pn- sequence In recent years, the applications of pseudo noise (Pn-) sequence are spreading through various fields and are increasing rapidly. Some particular fields are communications (CDMA), cryptography, signal detection, and identification in multiple-access communication systems. Pn-sequence is unique because of its spectral distribution and noise like qualities of the waveform. A random stream shows similar statistical behavior that of the same size Pn-sequences.
  • the prime advantages of a Pn-sequence are randomness and orthogonality of the sequence shifts which are employed in representation and compression of the random data/media.
  • the stego/secured information needs to transformed or represented such that it is random before embedding into cover digital media.
  • a novel combined compression and encryption technique for noise like data using pseudo noise (Pn) sequence such as M-, Gold, and Kasami sequence is introduced.
  • Pn pseudo noise
  • a set of random sequences may be generated. These Pn-sequences may be broken into various segments of same length as that of input. If the data is redundant, then the data is reconfigured using a Pn-sequence. This decreases the redundancy of input data and thus, makes data more suitable for the compression. These operations may result in a compression and encryption. Further, the proposed algorithm may be applied to various random data used in other applications.
  • compression is a technique that is used to encode data so that the data needs less storage/memory space. Compression of random data is vital in case where data needed to be preserved has low redundancy and whose power spectrum is close to noise. In case of steganographic images, the least significant is of high importance upon compressing with lossy algorithms the LSB might get lost. Since the LSB plane data has low redundancy, lossless compression algorithms may be affecting a good compression ratio.
  • Run length, Huffman code, Arithmetic coding, and the like are effective in compressing data that has redundancy. But if the data to be compressed is not redundant or random in nature, then the existing compression algorithms may not have a high compression ratio. For example, consider various bit-planes of an image as shown in the FIG. 1 . In most medical imaging operations compression of all the bit-planes is vital. Since the LSB planes data is random or has less redundancy hence compression ratio using the normal compression algorithms is minimal.
  • Steganography is a process of secretly embedding secured information in a harmless digital media without changing its perceptual or audible quality.
  • Digital steganography and watermarking are currently active research areas in signal processing that deals with encompassing methods of copyright protection, image authentication, and secured communications.
  • Several algorithms for data hiding in digital media have been proposed in both the time and frequency domain.
  • the present disclosure provides techniques in the time domain where the secured data is embedded in the least significant bit planes (LSB planes) of the cover image.
  • LSB planes least significant bit planes
  • FIG. 3A shows a least significant bit plane of a cover image.
  • FIG. 3B shows a road map image to be imbedded.
  • FIG. 3C show a LSB after embedding the image shown in FIG. 3B to FIG. 3A .
  • the information in the cover image with stego LSB plane may be random and may have minimal redundancy, therefore, normal compression algorithms are not effective.
  • the cover image with the secured data may need to be stored or transmitted over Internet.
  • some particular fields like communications (CDMA), cryptography, and signal detection and identification in multiple-access communication systems need additional or optional image processing.
  • the present disclosure use M-sequence because of the autocorrelation, spectral distribution, and noise like qualities of the waveform for these and other application.
  • a random sequence generated using a pseudo noise generator may be employed in coding the secured data and then is added to LSB plane of the data message.
  • the prime advantages of an M-sequence with a high period are an excellent effect of randomness and associated autocorrelation properties.
  • the PN sequences and M-sequence is described in more details below.
  • a compression technique that compresses the random data like noise with reference to binary pseudo noise sequence generated.
  • a first algorithm “Simple Pn-sequence based compression” may utilize a Pn-sequence for representing the random digital media with respect to keys. The logical operations may be considered for decreasing the errors arise during the decoding processing. The total random digital media length may be considered for compressing hence it provides a high compression ratio.
  • Multi Pn-sequence based compression proposes the whole random data may be broken into various segments, allowing for the encoding of any kind of randomness in the digital media.
  • This technique may use a combination of randomizing and compression of the digital media, reducing errors in decoding and can successfully compress any kind of digital media.
  • a pseudo noise sequence is a periodic binary sequence that is normally generated using linear feedback shift registers and well defined logic. These sequences may be semi-random, i.e. they are random in a particular period, but after each period, the sequences may repeat itself.
  • the waveform of PN sequences may be similar to noise-like waveform.
  • a Pseudo Noise sequence of sufficient length may have similar properties of a random data stream.
  • the various Pseudo noise sequences that are commonly used are M-sequence, Gold codes and etc., the M-sequence is simplest in form of the pseudo noise sequences.
  • FIG. 4 shows in general, an over view of various pseudo noise sequences.
  • M-sequence is a pseudo random binary sequence that may be generated by a linear feedback shift register with a generating polynomial (primitive) in which coefficients arise from Galois field. If the period of the pseudo random binary sequence is equal to about 2 n ⁇ 1 (n is the degree of the polynomial), it is called a maximum-length sequence (or M-sequence). An M-sequence may also be defined as a maximum-length shift register sequence. M-sequence is one of the simplest pseudo noise sequences. M-sequence may include various properties including:
  • the general encoding steps of compression algorithm include inputting the digital media or signal and decompose into its binary format representation.
  • a PN-sequence (M-sequence) may be generated from a pseudo noise generator using a key and generate the Pn-sequence matrix.
  • the generated sequence may be correlated and logical operations between two selected columns of a Pn-sequence matrix may be applied to generate a sequence close to the cover signal.
  • the correlation and logical operation step may be repeated with a new sequence code and a selected column of Pn-sequence matrix until fixed iterations are achieved.
  • the binary formats of the new sequence code may be recombined to generate a new compressed image.
  • the generated compressed image may have no relationship with the cover image.
  • to retrieve the information from compressed the image may be done by processing the compressed using decoding algorithm and the set of keys.
  • the block diagram for ‘Simple Pn-sequence decoder’ is presented in the FIG. 6 .
  • the general decoding steps include inputting compressed keys and decompose the keys into its binary format representation.
  • a pseudo noise sequence (M-sequence) may be generated from a pseudo noise generator using a key and generate the Pn-sequence matrix.
  • the generated sequence may be correlated and logical operations between two selected columns of a Pn-sequence matrix using the key to retrieve a sequence similar to a cover signal.
  • the correlation and logical operation step may be repeated with a new sequence code and a selected column of Pn-sequence matrix until fixed iterations are achieved.
  • the binary format of final sequence code from the previous step may be recombined to retrieve the cover digital media or signal.
  • the ‘Simple Pn-sequence based compression algorithm’ may compress random data successfully, however, the decoding algorithm may introduce errors on reconstruction of the original data, and also when the data has high redundancy. The algorithm may not be effective and may introduce a higher amount of errors on reconstruction of data. This motivated in developing ‘Multi Pn-sequence based compression algorithm’ which has similar frame work as ‘Simple Pn-sequence based compression’ algorithm but includes segmentation block and representation blocks in order to over come the above problems discussed above.
  • the segmentation block takes the input M-sequence which may be used as a reference for compressing the data.
  • the segmentation block may be broken into various segments having same length as that of input.
  • the number of reference sequences generating multiple Pn-sequences that are defined by a key may be increased.
  • the compression ratio of the data may be increased and the errors arise during the reconstruction of the original data may be decreased.
  • T The segmentation block's output sequences may also defined by a key.
  • the data configuration block may take the data and Pn-sequence as inputs and reconfigures the data thus decreasing the redundancy of input data and making data more suited for the compression.
  • the ‘Multi Pn-sequence based compression algorithm’ increases the compression ratio and also minimizes the loss of data during the decoding of the compressed data.
  • the general encoding steps of compression algorithm includes inputting digital media or signal and decompose the data into its binary format representation.
  • a pseudo noise sequence (M-sequence) from a pseudo noise generator using a key may be generated and a Pn-sequence matrix by segmentation of sequence may be constructed.
  • the digital media may be reconfigured by randomizing the media with respect to pseudo noise sequence generated.
  • the reconfigured data may be correlated and logical operations may be between two selected columns of Pn-sequence matrix to generate a sequence close to the segmented signals.
  • the correlation and logical operation step may be repeated with a new sequence code and a selected column of Pn-sequence matrix until fixed iterations are achieved.
  • the binary formats of the keys may be recombined to generate a new compressed image.
  • the general decoding steps of compression algorithm include inputting the compressed keys and decompose the keys into its binary format representation.
  • a pseudo noise sequence (M-sequence) from a pseudo noise generator using a key may be generated and a Pn-sequence matrix may be constructed by segmentation of sequence.
  • a correlation step and a logical operation step may be applied using the key to retrieve a sequence close to the cover signal.
  • the correlation and logical operation step may be repeated with a new sequence code and a selected column of Pn-sequence matrix until fixed iterations of the key are achieved.
  • the original digital media may be retrieved by randomizing the media with respect to pseudo noise sequence generated.
  • Binary formats segments may be recombine to retrieve the reconstructed digital media or signal.
  • FIGS. 7A , 7 B, and 7 C are shown in FIGS. 7A , 7 B, and 7 C ( FIG. 7A is a road map image, FIG. 7B is a satellite picture of the river, and FIG. 7C is a picture of a little boy).
  • random digital data generated for various lengths (16 to 512) were tested.
  • Table 1 below presents the simulation results using ‘Simple Pn-sequence based compression’ algorithms for compressing digital image LSB bit-planes and various lengths of data generated for 3 trials.
  • the various images with varying sizes are utilized and the last three bit-planes are used in simulation testing.
  • ‘Bit-plane 1’ indicates the least significant bit planes and follows.
  • the simulation results for 3 trials are presented in case of random data since at each trial the randomness of data obtained is different.
  • FIG. 8 shows the original bit-plane decomposition for the red layer of FIG. 7C .
  • FIG. 9 shows the same bit planes of FIG. 7 C's red layer after the data is reorganized using the data reconfiguration block. The redundancy in case of high significant bit-planes may be reduced and also the new classes of bit-planes may have similar similarities thus increasing the compression ratio of the whole image.
  • Table 2 below presents the simulation results using ‘Multi Pn-sequence based compression’ algorithms for compressing digital image LSB bit-planes and various lengths of data generated for 3 trials, in accordance with embodiments of the present disclosure.
  • the various images with varying sizes are utilized and the last three bit-planes are used in simulation testing.
  • ‘Bit-plane 1’ indicates the least significant bit planes and follows.
  • the simulation results for 3 trials are presented in case of random data since at each trial the randomness of data obtained is different.
  • Table 3 shows the comparison between the proposed algorithms to the convention run length function.
  • the comparison results prove that the run length algorithm actually needs more memory for storing the data than the actual image.
  • run length needs a matrix of size 757 by 757 (approximately) where as the proposed algorithm 2 (Multi Pn-sequence based) needs a matrix of size 473 by 473 (approximately), thus showing that the proposed algorithms provide a better compression ratio for random data.
  • ‘Simple Pn-sequence based’ and ‘Multi Pn-sequence based’ have been presented for compressing random data. Steganographic images least significant is of high importance but compressing using lossy algorithms the LSB plane might get lost. The algorithms are effective in compressing the LSB plane data. In addition, the bit-planes are represented with reference to the Pn-sequence thus making the data more random. This is better suited for compression using the proposed compression algorithms.
  • the amount of memory size required for storing the ‘Boy image bit-plane 1’ with the ‘Simple Pn-sequence based’ algorithm has a size of about 512 by 512, whereas the run length techniques needs a matrix of size about 757 by 757.
  • the ‘Multi Pn-sequence based’ algorithm needs a matrix of size 473 by 473 (approximately).
  • the compression ratio of the algorithms of the present disclosure may be improved by using conventional compression algorithms for bit-planes with high redundancy of the data (such as most significant bit-planes).
  • Adaptive steganography is a statistical approach for hiding the digital information into another form of digital media. The goal is to ensure the changes introduced into the cover image remain consistent with the natural noise model associated with digital images.
  • the global class encompasses all non-adaptive techniques and is the simplest to apply and easiest to detect.
  • the second classification is the local class, which defines most of the present adaptive techniques.
  • Image steganography is the art of concealing any binary representable digital media into a digital cover image.
  • the information intended to go unseen by intermediate parties is termed the steganographic content.
  • Hidden data formats are to include: audio signals, video files, text documents, as well as other digital images.
  • Non-adaptive steganography methods are predominantly simple embedding algorithms that at most incorporate a pseudo-random pattern in the embedding of secret information within an image. Such methods belonging to this category are readily available on the internet.
  • WbStego, SecureEngine, and Stool are three of the most commonly referenced and commercially available methods. Embedding approaches such as these make little, if any, acknowledgement to the statistics and visual features associated with the cover image. As a result, the resultant stego image is easily suspected of holding embedded information and very often is susceptible to localization techniques.
  • the present disclosure provides an adaptive technique that is able to overcome embedding capacity limitations and reduce the revealing artifacts that are customarily introduced when applying other embedding methods.
  • a third faction which is the pixel focused class of steganography is used.
  • the algorithm may be able to adaptively select the number of bits to embed per pixel.
  • a histogram retention process an evaluation measure based on the cover image and statistical analysis may allow for the embedding of information in a manner which ensures soundness from multiple statistical aspects.
  • the present disclosure shows how to securely allow an increased amount of embedding capacity, simultaneously avoiding detection by varying steganalysis techniques.
  • a new adaptive embedding technique that has been shown to reduce the probability of detection of steganographic content within digital images.
  • the algorithm may be able to foil steganalysis attempts of different natures and simultaneously increase the allowable embedding capacity.
  • Analysis and guidance are offered by a first-order stego capacity measure (FOSCM) that assists in, for example, the selection of which pixels to use for the embedding of information, the number of pixels to embed per pixel, the selection of which bit layers to hide information, the manner in which to embed information, and/or the selection of a cover image from a database of candidate cover images varying in size, format, and image features.
  • FOSCM first-order stego capacity measure
  • all data acquisition devices incur some level of noise, such as the quantization error introduced by digital cameras.
  • the changing frequencies of the color spectrum throughout an image also contribute to the presence of a natural noise level within a digital image.
  • the algorithm may be designed to find locations within an image where these concepts are most prominent. Pixels lying within regions characterized by chaotic variation, not structured variation found in edge pixels, may be identified, and may be further investigated to decide how many bits to embed and which bit layers to use in the embedding process.
  • the algorithm may apply an equivalent amount of analysis in order to enact efforts to retain the first-order statistical structure of the cover image.
  • the fundamental structure of the algorithm can be represented by the block diagram in FIG. 10 .
  • the algorithm includes several stages producing an elaborate embedding process.
  • Stage I development of T-order statistical directional variation and parameter selection process may be preformed. Steps including, but is not limited to, selection of embedding pixels, selection of number of bits per pixel to embed, and selection of which bit layers to embed in may be performed.
  • a first-order statistical retention may be performed. Steps include, but are not limited to, first-order stego capacity measure computer simulations, analysis, and conclusions.
  • the advantage associated with the new measure is the ability to amplify the level of local variation that is associated with the vicinity of a given pixel.
  • One of the foremost complications involved in the formulation of an adaptive steganographic algorithm is integrating a means for allowing the embedded information to be extracted. Specific pixels may be selected to carry stego information.
  • One commonly applied solution is to remove the influence of any pixels that are to be analyzed from the selection process. If bits are only to be changed in the least significant bit layer, than all bits in that layer may be zeroed out or all set to 1. In this manner, local variation measures may be irrelevant to the least significant bits' contribution to the pixel value. When investigating this process closer and when considering the insertion of information into multiple bit layers, there may be a resultant color reduction.
  • T-order statistics add sensitivity to the local variation measures. Removing the affected bit layers removes variation from the original cover image. The purpose of t-order statistical analysis is to offset this fault to reinstate a more accurate calculation of local variation.
  • an image may be scanned by a window of size 3 ⁇ 3, although other dimensions may be used.
  • a small window may ensure that variation calculation is as local as possible giving an accurate characterization of the information within the vicinity of a pixel.
  • a modified variance may be used as a characterization of the variation within the vicinity of a pixel.
  • a T-order value may be used as a substitute. The associated equation is given below.
  • is the variable assigned to the calculated local median-based variance.
  • the location of the pixel of interest within the image is designated by i and j.
  • the set of pixels within the window is x and N is the total number of pixels within the window.
  • the window size used is a 3 ⁇ 3, where the center value is the pixel for which the variation measure is calculated. A small window may be preferred in order to maintain the absolute locality of the variation measure.
  • Antonymous may be the minimum restriction of the window size.
  • the specified window size may be used. A 2 ⁇ 2 window would only consider four directions compared to the eight directions included in a window of size 3 ⁇ 3. Additionally, the variation measure of a 2 ⁇ 2 sample space would pertain to a pixel whose location was displaced by half a pixel both horizontally and vertically.
  • the pixel used for the embedding of stego bits may be defined as the best. If the calculated variation for a particular pixel exceeds the threshold by a determined magnitude, the pixel may be used for the insertion of multiple bits. This principle may be the key factor in the increase in the embedding capacity. In addition, to the increase in embedding capacity, the insertion of multiple bits may also assist in the retention of first order statistics. Embedding multiple bits within a cover image pixel essentially results in a reduced number of pixel values that are altered. Thus, there are fewer modifications to the frequencies in the histograms. FIG. 11 demonstrates the general concept behind the adaptive embedding process.
  • the reassigned value may be a non-adjacent value, diffusing necessary adjustments to a further distance.
  • the random spikes introduced by other methods are beneficially avoided.
  • the importance of the parameter selection process is to ensure an even distribution of stego information throughout the image, dependant on the size of the stego file that is to be embedded. Neglect of this factor in the embedding process may lead to regions in the image carrying a high density of stego information. Concentrated regions of altered pixels make the stego image susceptible to detection and also simplify any localization attempts. To facilitate extraction, information may be embedded from left to right and from top to bottom. Failure to select the proper parameters is demonstrated below in FIGS. 13A (excessively low parameters) and 13 B (adaptive parameter selection).
  • Selection of the parameters may be dependent on two dictating factors.
  • the second is the degree of magnitude that separates the single bit embedding threshold from the multi-bit embedding threshold.
  • the number of available pixels ⁇ may be found using the exponential function displayed above.
  • is the total number of pixels in the cover image
  • is an image dependent variation factor
  • is the ratio of the multi-bit threshold to the single bit threshold
  • is the single bit threshold
  • is the number of pixels with no local variation. This relationship is represented by the 3-dimensional graph below shown in FIG. 14 .
  • is the ratio of the multi-bit threshold to the single bit threshold
  • benefits and disadvantages to having both a low ratio and a high ratio.
  • include more multi-bit carrying pixels, a higher image capacity, a higher root mean square error, and/or a reduced number of changes in first-order statistics.
  • include a reduced number of multi-bit carrying pixels, a lower image capacity, a lower root-mean square error, and/or an increase in number of change in first-order statistics
  • the root-mean square error is a measure of how much change was introduced into the image and is one manner of rating the probability of detection.
  • the structure of first-order statistics may also be an important aspect to consider when aiming increasing resistance to detection attacks. A means of selecting the best balance between all the factors to be considered is presented in a following section. Histogram retention is another factor that warrants thorough consideration.
  • a final procedure to consider is the manner in which to embed the information with focus on a pixel and its associated bit layers. Bits may be inserted as far up as into the third least significant bit layer. Given the proper level of measured variation, the insertion of multiple bits and evidently a greater change in the value of a pixel will not be a cause for risen suspicion.
  • Selecting the proper thresholds may predetermine the locations of every pixel that may be used for embedding stego information and once this has been determined, the image may then be prepared for the second stage of the algorithm.
  • One objective of the second stage is to minimize any changes that must be unfortunately introduced into the image during the embedding process. While the insertion of stego information is taking place, records may be created and updated to remember the actions that have taken place. The focus of these efforts may be to retain the structure of the first-order statistics associated with a cover image. Analysis of first-order statistics is a common approach taken by detection methods and making efforts to maintain these characteristics will assist in evading detection. From FIGS.
  • a vector may be created monitoring all pixel value changes. When a pixel is to be changed, the vector may be checked and the possible new values which reflect the required bit/bits are queried. The pixel with the lower associated number in the vector may become the new pixel value. The steps defining this procedure are given below.
  • the technique includes identifying associated bit ⁇ bits with current qualified pixel. If the result is identical, there is nothing else to do. If not, find the two nearest pixel values with the required bit ⁇ bits.
  • a query data vector for recorded values of two nearest pixels may be performed.
  • a conversion from a pixel to pixel value with the lower associated number may be performed.
  • the vector may be updated by incrementing number for the selected pixel value.
  • the number associated with original value of the converted pixel is decremented and stego bit with appropriate records update may be outputted.
  • the First-Order Stego Capacity Measure may enable an optimal decision in the balance between RMSE and first-order statistics. With this measure, the best cover image for a specific stego file among a database of images varying in size, format, and features. Simultaneously, different existing embedding algorithms to determine the optimal performer may be tested. In order to calculate the FOSCM, a histogram may first be created for the stego image and the original cover image. The following equation is then applied.
  • x and y represent the histograms of the stego and original cover image.
  • K is the total number of possible intensities which for an 8-bit image or color layer is 256.
  • H is simply the sum of all differences introduced by the stego process between the two histograms.
  • the FOSCM may be calculated using
  • RMSE * H * ⁇ ⁇ , Eq . ⁇ 5
  • represents the FOSCM.
  • the variable ⁇ is the number of bits resulting from the conversion of the stego file into binary.
  • A is the total number of pixels in the cover image.
  • Computer simulations can be simulated in MATLAB software package.
  • Raw quick pairs (RQP) and RS-steganalysis detection algorithms may be reduplicated versions of the original algorithms.
  • the various test images used in this analysis are 512 ⁇ 512 color images shown in FIGS. 15A (squirrel), 15 B (blue coast), 15 C (bluebonnets), 15 D (building), 15 E (hen and rooster), 15 F (Golden Gate Bridge), 15 G (fish), 15 H (rock), 15 I (boy image), and 15 J (trolley)
  • the simulation results show that the presented method is in general immune to LSB detection methods.
  • the ‘ ⁇ ’ for cover image shown in FIG. 15D of size 512 ⁇ 512 for various values of ‘T’ & various percentages of embedding information are presented in the table 1.
  • the best T-order value for 10% of hidden information into cover of ‘Building’ is 1.
  • the best T-order value for 33% of hidden information into cover of ‘Building’ is 2 and the best T-order value for 33% of hidden information into cover of FIG. 15D is 9.
  • FIGS. 16 A and 16 B show various ‘ ⁇ ’ value for varying percentages of hidden for cover FIG. 15E with varying T-order values.
  • FIGS. 16A and 16B illustrates the variations in the ‘ ⁇ ’ value for varying percentages (for 10% and 30% of the stego information) is embedded into the cover image.
  • the best T-order value for 10% of hidden information into cover of FIG. 15E is 2.
  • the best T-order value for 33% of hidden information into cover of FIG. 15E is 9.
  • Table 5 provides the detection results when applying RQP steganalysis for a ‘blue coast’ cover with 50% hidden information for various t-order values.
  • the results in Table 6 show that in comparison to other embedding techniques, both random and adaptive, the method of the present disclosure is able to avoid detection in all simulations except for one.
  • the clean cover images were also tested to have some manner of control group for comparison with the gathered results.
  • the above provides an adaptive method of steganography that successfully reduces the probability of detection while simultaneously allowing a higher image capacity when compared to other adaptive embedding techniques such as the algorithms presented by Fridrich and Rui as well as existing random embedding methods. This may be accounted to the incorporation of t-order statistics in order to improve upon the sensitivity of the local variation measure calculations to offset the resolution reduction caused by the removal of bit layer information.
  • Using the adaptive multi-bit principle more information is able to be inserted which has the additional benefit of reducing the necessary changes of necessary first-order statistics as a result of utilizing a reduced number of cover image pixels.
  • the adaptive assignment of the threshold in order to allow for an ideal distribution of stego information throughout the image further assists in the decreasing in the risk of detection.
  • Adaptive steganographic techniques have become a standard direction taken when striving to complicate the detection of secret communication.
  • the consideration of cover image features when embedding information is an effort to insert digital media while keeping the visual and the statistical properties of the cover image intact.
  • a new adaptive embedding technique which alters the least significant bit layers of an image. This technique is driven by three separate functions: 1) adaptive selection of locations to embed; 2) adaptive selection of number of bits per pixel to embed; and 3) adaptive selection of manner in which the information is inserted.
  • the algorithms may be able to provide the desired level of security, both visually and statistically.
  • a new adaptive embedding technique that has been proven to minimize the detection of steganographic media within digital images is provided.
  • the algorithms may be able to provide a sound level of security while simultaneously increasing image capacity.
  • Analysis is assisted by the use of a new stego capacity measure which offers insight to the relationship between capacity and image modification. Through this measure, the best candidate may be chosen to cover from a database of images with varying sizes, formats, and features.
  • Information to be embedded may be either done by changing coefficients in the transform domain or, in one embodiment, remaining in the spatial domain and altering the least significant bits of the binary representation of a digital image.
  • the proposed LSB embedding algorithms take advantage of the uncertainty and noise like properties that are associated with certain regions within a candidate cover image. All data acquisition devices, such as digital cameras, incur some level of noise. The changing frequencies of the color spectrum over an image also imitate noise like qualities. The ability to successfully identify regions of an image where this idea is prominent may ensure the failure of detection software attacks.
  • the algorithms for this new adaptive approach are derived from noise identification algorithms proposed by Agaian, Sifuentes, and Lamoroueux. These algorithms use detection measures with increased statistical sensitivity to successfully separate noisy pixels from those naturally associated with the image.
  • the basis structure of the algorithm is represented by the block diagram in FIG. 17 .
  • the presented method may be subdivided into two systems.
  • the algorithm includes several stages producing an elaborate embedding process.
  • System I may be used for the development of variation measures and explanation of the threshold derivation process including selection of best locations to embed and/or selection of number of bits per pixel to embed.
  • System II may execute a histogram retention algorithm and embedding process.
  • the algorithm may also include a First-Order Stego Capacity Measure (FOSCM), computer simulations, and/or analysis. Analysis may be done using a database of 100 color and 100 grayscale bitmap images varying in size, color, and classes of image features. Stego files of different size and format may be also used to demonstrate their affects on the detection process.
  • FOSCM First-Order Stego Capacity Measure
  • the present disclosure's method is shown to perform quite well in maintaining a resistance to detection as well as enabling an increase in the amount of stego capacity. Detection tests were done using implementations of RS Steganalysis and Histogram Quick Frequency.
  • the primary function of the variation measures may be to form a foundation for the adaptive selection of embedding locations and the number of bits per pixel to embed.
  • This measure may be used as an integral component to the noise detection algorithms.
  • the objective is to modify the cover data to reflect the binary information to be hidden while ensuring that changes do not exceed the noise threshold.
  • Algorithms intended for the detection of noise corrupted pixels may simply tuned down to the level of detecting natural image noise.
  • FIGS. 18A (image corrupted with Gaussian Noise) and FIG. 18B (clean image) demonstrates the detection of noise both in an image corrupted with Gaussian noise and a clean image.
  • Pixels considered noisy are represented in gray and edge pixels may be designated in black. Edge pixels also have noise-like characteristics and as a result, may be included for considerations of noise. The clean image with corrupted pixels identified demonstrates the presence of natural noise.
  • the measure we use as a characterization of the variation within the vicinity of a pixel is a modified variance. Instead of using the mean of the acknowledge intensities, we substitute the median value. The associated equation is given below.
  • is the variable assigned to the calculated local median-based variance.
  • the location of the pixel of interest within the image is designated by i and j.
  • the set of pixels within the window is x and N is the total number of pixels within the window.
  • the window size used in this application is a 3 ⁇ 3, where the center value is the pixel for which the variation measure is calculated. A small window may be preferred in order to maintain the absolute locality of the variation measure.
  • a pixel may not be rational to consider a pixel as being within a high variation region when the location of such is actually three pixels away from an area truly containing a sufficient level of noise.
  • Antonymous is the minimum restriction of the window size.
  • a specified window size may be used. A 2 ⁇ 2 window would only consider four directions compared to the eight directions included in a window of size 3 ⁇ 3. Additionally, the variation measure of a 2 ⁇ 2 sample space would pertain to a pixel whose location was displaced by half a pixel both horizontally and vertically.
  • the determination of the variation measure pertaining to each pixel enables the algorithm to select at which locations would be best to insert information. If the local measures exceed a certain threshold level, the pixel may be deemed as a suitable candidate for the insertion of binary data. If the variation measure is found to exceed the threshold by a determined magnitude, the pixel may facilitate the hiding of multiple bits. This adaptive selection of how many bits per pixel to embed is the foundation of the increased capacity the proposed algorithm is able to offer. Under certain conditions, the noise level at a designated region may be sufficiently high to allow a greater level of modification to the value of a pixel. FIG. 11 demonstrates the general concept behind this process.
  • the idea of embedding multiple bits per pixel also assists in the retention of first-order statistics. Since fewer pixels are modified, there may be a reduced number in modifications of frequencies in the histograms. Furthermore, when embedding multiple bits, often the pixel may be reassigned a value other than the adjacent intensity. Necessary adjustments are diffused at a further distance, counteracting the random spikes that often occur within the histogram with various other techniques. Thus, the increased embedding capacity property is also inherent in the decrease in probability of detection of steganographic activity.
  • a 512 ⁇ 512 grayscale image may be used as the cover media. Stego information was hidden in approximately 75% of the pixels in the cover image. A high percentage of embedded information may be inserted to make the random spikes more visually prominent. The statistical analysis is much more sensitive to histogram frequency characteristics than what is able of the human visual system.
  • RMSE root-mean-square error
  • the purpose of the threshold derivation process may be to ensure an even distribution of stego information throughout the image.
  • This process selects the threshold in a manner in which the safest pixels may be used first in relevance to the size of the stego file to be embedded. To facilitate extraction, information may be sequentially embedded from left to right, top to bottom. If the threshold is randomly selected, one may be unsure of the resultant distribution of steganographic data. A very high threshold may not accommodate the amount of space required. Setting the threshold excessively low may result in a higher than necessary density of modified pixels.
  • FIG. 19A (excessively low threshold) and FIG. 19B (adaptive threshold selection) provide an example demonstrating the importance of selecting the proper threshold. Stego containing pixels are represented in black.
  • the decision of the threshold may be dependant of two variables: the amount of data that is to be inserted, and the magnitude of the difference in thresholds distinguishing single and multi-bit carrying pixels.
  • the relationship between the number of candidate pixels and the threshold value is an exponential function as is displayed in FIGS. 20A and 20B .
  • the Z axis of the left graphic in FIG. 20A represents the number of pixels that qualify for stego insertion based on a particular threshold value.
  • the Y axis in the left graphic represents the ratio between the single-bit and multi-bit thresholds. The greater the value of this ratio, the sharper the knee in regards to the exponential function. The importance of the incline may be its determination in the level of control over the number of available pixels. Little control results in a reduced ability to find an optimal distribution for stego information. Additionally, a higher ratio may reduce the allowable image capacity and degrade the effectiveness of the multi-bit principle. However, there is an indirect relationship between the ratio and the RMSE value. A higher ratio corresponds to a lower resultant error value.
  • a low ratio results in a smooth and higher curve offering greater control of stego distribution and an increased embedding capacity.
  • the associated negative factor may have an increase in the RMSE value, somewhat contributing to the risk of detection.
  • the decisive factor in the selection for the optimum balance may be the effects of the selected parameters on first-order statistics and a measure for making such decisions is presented in a following section. Associated, histogram retention may be a significant factor crucial to the performance of the proposed algorithm.
  • the selection of the threshold and applied ratio predetermines every location for the insertion of stego information. All the functions of System I may be a required preliminary for the second system.
  • the purpose of histogram retention may be an effort to preserve first-order statistics. Natural digital images may generally produce a smooth histogram, characterized by gradual fluctuations throughout the entire intensity spectrum. As displayed in the previous example presented, steganographic processing has the effect of disrupting this expected behavior. The goal of histogram retention is to minimize this affect and maintain the natural appearance of statistical properties of the image. In order to accomplish this, we create a vector that records all applied pixel modifications. If the opportunity arises to counteract a previous modification, the algorithm may recognize such and enact the rectification. The histogram retention efforts may occur simultaneously with the embedding process. The data vector may be iteratively queried and updated with each transformed pixel. The general procedure of this process is accomplished by applying the following steps to the histogram retention algorithm.
  • values of next bit ⁇ bits to be embedded may be inputted.
  • an identification step identifying associated bit ⁇ bits with current qualified pixel, and if the comparison shows that qualified pixel and bit ⁇ bits are identical, there are no further actions to be taken. If the comparison shows that they are not identical, the two nearest pixel values with the required bit/bits may be found.
  • a query data may be used for recording the values of the lower associated number and a vector may be updated by increment number for the selected pixel value.
  • the original value of the converted pixel may be updated by incrementing an update vector. Next, the original value of the converted pixel may be decreased.
  • the First-Order Stego Capacity Measure enables an optimal decision in the balance between RMSE and first-order statistics.
  • the best cover image for a specific stego file among a database of images varying in size, format, and features may be found.
  • different existing embedding algorithms to determine the optimal performer may be tested.
  • the FOSCM In order to calculate the FOSCM, a histogram must first be created for the stego image and the original cover image using, for example, Eq. 4. Upon derivation of the H value, the FOSCM may be calculated using, for example, Eq. 5. With the calculation of ⁇ comes the ability to simultaneously minimize RMSE and altering of first-order statistics.
  • the second method includes an adaptive, multi-bit capability method without histogram retention processing and the third is our fully adaptive algorithm with histogram retention.
  • the test images used in this analysis are the 512 ⁇ 512 grayscale images displayed in FIG. 21A (fisherman sign) and FIG. 21B (Trolley).
  • Incremental sizes of stego files may be embedded using each method and the associated H values are plotted in FIG. 22 .
  • the X axis in of the figure represents the ratio of number of bits resultant of the binary conversion of the stego data to the number of pixels in the cover image. Percentages from 10% to 80% in increments of 10% were introduced into the cover image.
  • the Y axis of FIG. 22 represents the sum of the magnitude differences between histograms of the original and stego images.
  • the resultant values for each percentage of embedding are represented by three distinguishably formatted plots.
  • the proposed method proves to give the lowest level of histogram modification in comparison to the other adaptive methods.
  • the random embedding method SecurEngine was excluded from this simulation to reduce graphical clutter but will be acknowledged in the following example to demonstrate its associated deficiencies in comparison to the adaptive methods.
  • the second example shows the magnitude of the difference for each particular intensity frequency in relation to the original and stego images.
  • the number of bits embedded is 10% of the number of pixels in the cover image.
  • These plots are from steganography embedded into the fishermen test image ( FIG. 21A ).
  • FIG. 23A a proposed histogram is shown.
  • FIG. 23B is an adaptive method from current technologies.
  • FIG. 23C is a proposed method without histogram retention.
  • FIG. 23D is a histrogram from SecurEngine.
  • FIG. 24A a proposed histogram is shown
  • FIG. 24B is an adaptive method from current technologies
  • FIG. 24C is a proposed method without histogram retention
  • FIG. 24D is a histrogram from SecurEngine.
  • the histograms of the stego image using the proposed method and the stego image using the simple adaptive algorithm by Fridrich and Rui are compared to the histogram of the original image in FIGS. 25A (histogram of a cover image) and 25 B (histogram of stego image with best threshold).
  • These histograms, excluding the original cover image, may be embedded with an amount of bits approximately equivalent to 80% of the number of pixels in the cover image.
  • the final example expresses the extent to which we may embed information and not noticeably alter the ideal histogram.
  • This boundary may be relevant to the region preceding the knee of the exponential function showing the relationship between the threshold and the number of qualified pixels associated with that particular threshold.
  • the optimum secure capacity may be attained by constraining the threshold in the region directly prior to the point in which control of distribution becomes unstable. In relation to the curve on the left of FIG. 14 , this region would lie in the threshold range from approximately 50-60.
  • FIG. 26A original image histogram
  • 26 B hoverogram of image after methods of the present disclosure
  • 26 C show the histogram when the threshold is assigned within this region.
  • FIG. 27 shows the calculated FOSCM values associated with embedding the file into the five test images.
  • the image pertaining to the lowest FOSCM measure is the best image to use as the cover for the specified stego.
  • the best cover image was determined to be the chess match image (4 th column).
  • Table 7 gives the detection results when applying RS steganalysis.
  • RS steganalysis is well known to detect even very small stego messages. Given is the detected message length in terms of bytes. 10% pertains to a message length of 3,249. 33% pertains to a message length of 10,816 and 50% pertains to a message length of 16,384.
  • the RS Steganalysis generally failed to detect the level of information that was actually embedded but succeeded in detecting for almost all other methods of steganography. Similarly, histogram quick frequency detected stego in the new method in the fewest number of trials. Outperformed were SecurEngine, an adaptive method and a random method.
  • This section focuses on essential problems faced in digital image archiving.
  • One of the principal objectives is to preserve secure digital media and information for the future.
  • In addition to identifying file formats where storage systems and current technology are still in their infancy research is the key component in maturing these systems.
  • Furthermore, with developing new generation of archiving system there is a need to have a high capacity embedding methods.
  • the present disclosure stores digital image content within a secure storage preserving the content without allowing an unauthorized third party the ability to view the content even in the event that the security is breached.
  • a new secure high capacity embedding method may be used in a secure multilayer database system for digital image archiving.
  • This steganographic approach has the following advantages: 1) BPCS Steganographic method for palette-based images; 2) provides additional security through a simple selective color and cover image algorithm; 3) provides the closest color substitutes using a weighted distance measure; 4) offers an increased capacity by embedding in N ⁇ M blocks sizes; and 5) the secure media storage system contains an independent steganographic method that provides an additional level of security.
  • palette-based steganographic method with increased security and embedding capacity is provided.
  • Another area of interest is the capacity that digital media can handle before visual and statistical artifacts cause degradation to the cover file.
  • Many steganographic capacitates have been proposed to improve both steganographic embedding and detection processes within media files.
  • capacity from the communications point of view or consider the capacity as the value of a mutual-information game between the data hider and the attacker, for example 1) data hiding capacity has been calculated as the capacity of the Gaussian channel; 2) the capacity of the data hiding channel has been regarded as intentional jamming for the source of noise; 3) a comprehensive model is described, which analyzes the performance of a proposed scheme for data hiding; 4) estimates data-hiding capacity has been estimated as a maximum rate of reliable transmission, for host-image sources; 5) a theoretic approach has been presented which obtains an estimate of the number of bits that can be hidden in still images, or the capacity of the data-hiding channel; and 6) estimated boundaries have been calculated for steganographic-communication channel capacity.
  • the method of the present disclosure may be applied to a secure multilayer database system for digital image archiving.
  • This disclosure discusses the necessary background for bit plane complexity measure and the bit plane stego sensitivity measure used for image capacity. Palette based bit plane steganography is described in the third section followed by the computer simulation.
  • ⁇ ⁇ M R , C [ • ... • ⁇ ⁇ ⁇ • ... • ] be any mask at R, C pixel location.
  • the number of adjacent pixels surrounding a center pixel at the pixel location may be denoted R, C.
  • the pixels for each bit plane decomposition may have a difference of less than one.
  • is an incremental count of the adjacent pixel comparisons that meets the given threshold of one, and ⁇ max the maximum number if all adjacent pixel comparisons meet the threshold within a block size and a moving mask. The same pixels may not to be compared.
  • Other masks as defined in the original complexity measure may be used as well.
  • I be an image of size N 1 ⁇ N 2 and let I B be the bit plane decomposition of an 8-bit color layer.
  • Each of the decomposed bit planes may be divided into blocks, sub bit planes, of M 1 ⁇ M 2 from the image I B .
  • the pixel comparison based complexity measure for bit plane is defined as:
  • m and n are the block locations being analyzed and i defines the bit plane layer.
  • Each of the bit planes are scanned individually for ideal regions of embedding.
  • ⁇ i (m, n) are the block values containing all of the complexity values within the image bit plane
  • N is the number of rows in ⁇
  • M is the number of columns in ⁇ .
  • Non-zero values are not stored to derive a true threshold for the bit plane.
  • the general algorithm for calculation of bit plane stego sensitivity measure includes inputting an image of any size to be analyzed for embeddable regions.
  • the image may be divided into color layers followed by a bit plane decomposition step.
  • a block size is determined and the bit plane is divided into analyzed sections.
  • a mask size may be decided.
  • the value of ⁇ for each block may be calculated ensuring the blocks overlap.
  • An initial value for the threshold of ⁇ may be calculated.
  • is determined to see if its value meets the threshold and categorize ⁇ is into embeddable regions. Rows and column location of the embeddable region may be outputted.
  • the steganographic capacity is used to separate the image into embeddable regions within the image and non-embeddable areas. This is shown in HG. 28 where the highlighted blocks may be considered embeddable areas and the natural spaces are non-embeddable regions. These designations will be used to embed secure information within the embeddable regions.
  • palette-based images Due to high redundancy within the image, true-color images have higher embedding capacities.
  • palette-based images have been used as cover images to provide a secure and fast transmission/storage over a communication system. Due to their abundance within vast systems, it is difficult to find a suspicious stego-image. Furthermore, since there are alterations introduced by the color reduction and errors in storage, the steganographic message is able to pass as noise. Given that palette-based images have a smaller resolution, they can also be transmitted faster than 24-bit resolution images through a communication channel during archiving.
  • Two new practical steganographic including embeddable and non-embeddable capacities are provided. These methods randomly select pixels in the index of an embeddable region within an image and arrange it (using special sorting scheme) in such an order to provide the desired secret key. This method may replace a randomly selected pixel by the closest pixel in the color space that contains the desired parity bit.
  • the new capacities palette based embedding may be used for 1) separation of a given image into embeddable and non-embeddable areas; 2) identification of the minimum and maximum embedding capacities of a cover digital image; 3) selecting the best cover image from a class of images; and 4) embedding only in selected colors of the palette.
  • This offers the advantage that secures data can be embedded within the index, the palette, or both therefore, adding an extra level of security.
  • This method embeds in the palette by applying sensitivity measure technique previously used for gray scale and color images. This technique is applied to full color images by decomposing the image into its three color layer components within the digital image and treating each layer as a gray scale image. Next, an embedding into one or more of the color components of each layer of the images may be performed.
  • the number of colors in the palette after embedding may be over the maximum number allowed.
  • color quantization may be applied. After information is embedded, it may be imperative that pixel values of the color component contains the embedded information, otherwise the secure data can be lost. Changes may be made to the pixel values of the other two color components within the images. It is assumed that the degrading of the color component image with information embedded is smaller than that of the color component images that are used for color reduction.
  • the human visual system is more sensitive to changes in the luminance of a color. Since G has the largest contribution to luminance of the three color components, information is primarily embedded in this layer.
  • One of the effects caused by this method is that the number of colors in the palette changes. In order to balance the palette to the original number of colors, the R and B components may be modified in a way that minimizes the square error.
  • the information may be embedded in a way that the color that is the most sensitive to changes is not affected.
  • This algorithm can not be applied directly to a particular color in the palette-based image. Since the color vectors in a palette are form as a combination of the red, green and blue, the image has to be separated in to its color layers using the RGB color mode. After embedding we most go back to palette-based, this is achieved using color quantization.
  • the next step in this algorithm is to determine which color is the most sensitive to changes.
  • the color green was chosen since it has the most effect on the luminance and the human eye is more sensitive to changes in the luminance.
  • the reason for selecting the most sensitive color layer for embedding is to preserve the luminance information.
  • the information may subsequently be embedded in the noisy areas selected by the binary pattern complexity system.
  • a new palette-based steganographic method with improved selective quality and embedding capacity is provided.
  • a Bit Plane Stego Sensitivity Measure (BPSSM) may be applied to one of the color components that resulted from switching to the RGB model.
  • BPSSM Bit Plane Stego Sensitivity Measure
  • a layer for embedding is selected. It is noted that the best layer can vary depending on the image used.
  • embeddable regions from the selected layer may be extracted. Note, this algorithm may only embed on the selected areas of the best color layer.
  • the general algorithm for palette based steganography using complexity measures includes an input step for inputting an image of any size to be analyzed. Color values from the image may be obtained and a color layer for embedding may be selected. Embeddable regions using the bit plane stego sensitivity measure may be obtained and may be applied to the selected color layer. A new palette using the best color layer may be produce, while the other layers of the image remain intact. The embedded palette-based image may be outputted.
  • color vectors that share the same value of the selected color layer may be obtained to make a new table. Using this table, the new color vectors for red and blue may be computed. For example, if selected color layer is a green layer, three red and blue colors that share a green may be obtained and a mean value may be calculated. These values are denoted mean read (MR) and mean blue (MB). For improvement in the reduction method, the square errors to determine which combinations are the best are calculated.
  • MR mean read
  • MB mean blue
  • Tables 9 and 10 illustrate the differences by incrementing the embedded data.
  • FIG. 30 the maximum amount of data that it takes to load the image with secure data without causing visual changes was embedded. The same amount of information was embedded using BPCS method the embedded data causes statistical and visual changes within the image.
  • the presented method's maximum capacity while embedding in the lower bit plane layers fluctuated between 9.4k and 13.6k while the BPCS method fluctuated between 5.4k and 8.7k.
  • the presented algorithm (using both RGB and YCbCr color formats) was compared with the BPCS palette based algorithm by embedding in 256 ⁇ 256 images. Tables 11 and 12 illustrate the differences by incrementing the embedded data.
  • Tables 11 and 12 illustrate the differences by incrementing the embedded data.
  • a maximum amount of data that it takes to load the image with secure data without causing visual changes was embedded.
  • the same amount of information using BPCS method was embedded and the embedded data causes more statistical and visual changes within the image than both presented methods (RGB and YCbCr).
  • the presented method's maximum capacity while embedding in the lower bit plane layers fluctuated between 9.4k and 13.6k while the BPCS method fluctuated between 5.4k and 8.7k.
  • the presented method for both RGB and YCbCr color models is better at identifying the noisy regions.
  • the bit plane stego sensitivity measure adaptively selects the best embeddable block within the noisy regions. This is the reason why the presented method has outperformed the BPCS palette based steganography scheme.
  • bit plane stego sensitivity measure for palette-based images provides a secure and fast transmission/storage over a communication system, offers additional security through a simple selective color and cover image algorithm, provides the closest color substitutes using a weighted distance measure, offers an increased capacity by embedding in N ⁇ M adaptive blocks sizes, the secure media storage system contains an independent steganographic method that provides an additional level of security, among other advantages. This method may be used to further enhance the steganographic algorithms utilized for digital image archiving purposes.
  • This table contains the averages of the detection percentage results of 100 512 ⁇ 512 palette based images using RS Steganalysis. This images where embedded in the RGB color model. Detection Cover Embedded Detection Clean Image Differences % Red Green Blue Red Green Blue Red Green Blue 1% 2.93% 2.68% 2.74% 2.93% 2.94% 2.74% 0.00% 0.26% 0.00% 3% 2.93% 2.68% 2.74% 2.93% 3.41% 2.74% 0.00% 0.74% 0.00% 6% 2.93% 2.68% 2.74% 2.93% 4.43% 2.74% 0.00% 1.75% 0.00% 12% 2.93% 2.68% 2.74% 2.93% 6.39% 2.74% 0.00% 3.72% 0.00% 23% 2.93% 2.68% 2.74% 2.93% 11.25% 2.74% 0.00% 8.57% 0.00% 40% 2.93% 2.68% 2.74% 2.93% 18.59% 2.74% 0.00% 15.92% 0.00% 76% 2.93% 2.68% 2.74% 2.9
  • This table contains the averages of the detection percentage results of 100 512 ⁇ 512 palette based images using RS Steganalysis. This images where embedded in the YCbCr color model. Detection Cover Embedded Detection Clean Image Differences % Red Green Blue Red Green Blue Red Green Blue 1% 2.93% 2.68% 2.74% 4.00% 3.58% 4.95% 1.08% 0.91% 2.21% 3% 2.93% 2.68% 2.74% 4.03% 3.53% 4.91% 1.10% 0.85% 2.18% 6% 2.93% 2.68% 2.74% 4.05% 3.41% 4.77% 1.13% 0.74% 2.03% 12% 2.93% 2.68% 2.74% 3.95% 3.24% 4.59% 1.03% 0.57% 1.85% 23% 2.93% 2.68% 2.74% 3.98% 3.24% 4.34% 1.05% 0.57% 1.60% 40% 2.93% 2.68% 2.74% 3.60% 3.03% 4.18% 0.67% 0.35% 1.44% 76% 2.93% 2.68% 3.60%
  • bit plane stego sensitivity measure for palette-based images provides a secure and fast transmission/storage over a communication system; 2) Offers additional security through a simple selective color and cover image algorithm; 3) Offers an increased capacity by embedding in N ⁇ M adaptive blocks sizes; 4) Offers the option of working with different color models; and 5) secure media storage system contains an independent steganographic method that provides an additional level of security. This method can be used to further enhance the steganographic algorithms utilized for secure digital image transmission.
  • the methods of the present disclosure may be performed using executable instructions.
  • a computer code for implementing all or parts of this disclosure may be used.
  • the code may be housed on any computer capable of reading such code as known in the art.
  • it may be housed on a computer file, a software package, a hard drive, a FLASH device, a USB device, a floppy disk, a tape, a CD-ROM, a DVD, a hole-punched card, an instrument, an ASIC, firmware, a “plug-in” for other software, web-based applications, RAM, ROM, etc.
  • the computer code may be executable on any processor, e.g., any computing device capable of executing instructions for traversing a media stream.
  • the processor is a personal computer (e.g., a desktop or laptop computer operated by a user).
  • processor may be a personal digital assistant (PDA) or other handheld computing devices.
  • PDA personal digital assistant
  • the processor may be a networked device and may constitute a terminal device running software from a remote server, wired or wirelessly.
  • Input from a source or other system components may be gathered through one or more known techniques such as a keyboard and/or mouse.
  • Output if necessary, may be achieved through one or more known techniques such as an output file, printer, facsimile, e-mail, web-posting, or the like.
  • Storage may be achieved internally and/or externally and may include, for example, a hard drive, CD drive, DVD drive, tape drive, floppy drive, network drive, flash, or the like.
  • the processor may use any type of monitor or screen known in the art, for displaying information.
  • a cathode ray tube (CRT) or liquid crystal display (LCD) can be used.
  • CTR cathode ray tube
  • LCD liquid crystal display
  • One or more display panels may also constitute a display.
  • a traditional display may not be required, and the processor may operate through appropriate voice and/or key commands.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Compression Or Coding Systems Of Tv Signals (AREA)

Abstract

Methods and systems for securing digital imagery are provided. In one respect, embedding, compression, encryption, data hiding, and other imaging processing techniques and systems may be provided for digital image security. In one non-limiting example, a method for producing a compressed and encrypted image is provided. An image may be converted into a binary bit stream, and the bit stream may be decomposed into a plurality of segments. A binary sequence based on a first key may be generated and may be used to generate a code matrix. A distance between the code matrix and the distance may be determined for each of the plurality of segments. Using a combined first and second key, a compressed and encrypted image may be obtained.

Description

This application claims priority to provisional patent application Ser. No. 60/745,729 filed Apr. 26, 2006. The entire text of this disclosure, including figures, is incorporated by reference.
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates generally to image processing. More particularly, the present disclosure relates to methods for encrypting digital images.
2. Description of Related Art
The use of digital documents, medical images, and satellite images has been increasing exponentially along with the interest in image compression algorithms. One of the most important problems in various applications is the data storage and transmission which in many situations resolved by the compression techniques. Compression is defined as the reduction in size (in bytes) of a data/image with acceptable distortions in its quality. There are various compressions techniques proposed that compress the binary data like Huffman coding, Run length coding, etc. The conventional lossless compression algorithms are ineffective in compressing data with low redundancy (like least significant bit-planes).
The referenced shortcomings are not intended to be exhaustive, but rather are among many that tend to impair the effectiveness of previously known techniques for generating an image processing; however, those mentioned here are sufficient to demonstrate that the methodologies appearing in the art have not been altogether satisfactory and that a significant need exists for the techniques described and claimed in this disclosure.
SUMMARY OF THE INVENTION
The present disclosure provides a novel steganographic algorithm for different image models, and in particular, embedding secure data in a layer of a host image. In one respect, the algorithm may embed secure data within a best embeddable region of a layer (e.g., a selected color layer, a significant bit layer, etc.).
In one respect, the algorithm may provide an option of selecting the best color models for embedding purposes. This achieves introducing higher embedding capacity with less distortion as compared to conventional techniques. In addition to or alternatively, the algorithm may provide the use of a complexity measure for cover images in order to select the best of the candidate layers for the insertion of the steganographic information.
In one embodiment, a cover or host image may be decomposed into several color layers. The image may be converted into several color layers using, for example, the following color models: RGB (red, green, blue), YCbCr (luminance, chrominance blue, chrominance red), YIQ (luminance, intensity, chrominance) HSV (hue, saturation, value), CMY (cyan, magenta, yellow), CMYK (cyan, magenta, yellow, black), and/or other documented color models. In one respect, the image may be decomposed using a best color model for a given image and secure data.
Once the image is decomposed, the embeddable regions may be selected. In one respect, a layer or multiple layers are chosen from the selected model. The layer(s) identified by the measure as the key color within the image are selected for embedding. It is noted that the color layer may vary with different images and color models.
Next, the selected embeddable layer may be categorized into non-overlapping embeddable or non-embeddable regions. The identified region may further be categorized for the measured upper boundary of the maximum capacity in bits that can be altered without causing perceptual differences. In one embodiment, the embedding procedure takes place in the selected regions which may include multiple layer bit planes. Subsequently, a color reduction development step may be performed.
In other respects, the algorithm may embed secure data in a least significant bit layer of a host image (e.g., a digital carrier 8-bit grayscale or 24-bit color imagery). Areas of high noise resemblance may be detected using a measure gauge local variation. Digital message (e.g., secure data) may be hidden by modifying the least bit layers of best host pixels. Subsequently, computational processes may be incorporated to retain the statistical structure that is associated with the host image. A first order stego capacity measurement may be taken, which enables an optimal selection of the parameters to be applied during the embedding process. This measurement may evaluate the approach taken and gives a resultant value which may depict the affects of the embedding process from a root mean square error and first order statistical point of view.
In one embodiment, a host image may be processed and analyzed according to the variation measurement. A stego file may be acknowledged and an extraction tag is formed to enable an extraction and reconstruction of the received stego image. The stego image may be converted into a binary string and a threshold selection process may be performed based on, for example, the size of the stego file to be embedded and/or the values dictated by a first-order stego capacity measurement (FOSCM). The selected threshold process may ensure an even distribution of stego information upon the host image and may select. In addition to or alternatively, the threshold value may provide security from different types of detection processes.
Once host pixels from the host image have been identified, the data from the first stage may be forwarded to a second stage which embeds the secure data. In one respect, the embedding process may occur simultaneously with a histogram retention algorithm used for statically or dynamically updating record of occurring events in the embedding process. This may reduce the first-order statistical modifications. For example, if the insertion of the secure data requires changing of the value of the original pixel in the host image, the occurrence is noted. Simultaneously, every time a change in an original pixel is required, the records are queried and the pixel is modified to a value that may counteract any previous changes. This step is possible due to the fact that, when a pixel value must be changed, there may be a lower pixel value and a higher pixel value that will reflect the desired bits in the least significant values. A tag may subsequently be inserted, resulting in a host image ready for transmission.
In other respects, the algorithm may decompose a digital media or signal into its binary format representation. Next, a pseudo noise sequence may be generated using for example, M-Sequence, gold codes, chaotic, and the like. The decomposed digital media or signal may be encrypted using, for example, the pseudo noise (Pn) sequence. A Pn-sequence matrix may be generated by segmentation of the pseudo noise sequence.
In addition or alternatively, a simultaneous compression and encryption process whereby a digital media may be compressed is presented. The technique may reduce transmission time and storage space of the signals. The encryption method/system includes the steps of converting an image into a binary bit stream; transforming the binary bit stream into binary vector; and segmenting binary vector into various segments. The compression method/system includes the steps or generating a random sequence (for example M-sequence, gold codes, etc.); developing a code matrix based on the random sequence; determining the distance measure between code matrix and each segmented binary vector, generating a key based on the distance measure. Combine all the keys generated and append the keys used to segmenting and random sequence generating to obtain a compressed and encrypted image. Any encryption technique made on the image decreases the redundancy, making the method/system suitable for use in compressing encrypted images. In addition, this method/system may be used to compress noise like signals, represent any multi-media data (e.g., images, audio, video, and other media sources). This method/system may be applied for any application that requires authentication, data integrity, data confidentiality, and data security.
In embodiments where the digital media or signal includes high redundancy, the digital media or signal may be reconfigured with respect to pseudo noise sequence generated. Subsequently, the digital media or signal may be correlated and applied to a logical operation between two selected columns of the Pn-sequence matrix to generate a sequence close to or equivalent to the segmented media.
The steps of segmentation and configuration may be repeated with a new sequence shift code and a selected column of Pn-sequence matrix until a maximum estimate of the original digital media or signal is completed. The algorithm may subsequently be recombined by reassembling the binary formats of the shifts codes to generate a new compressed image.
To decode the compressed image, the compressed image may be decomposed into its binary stream presentation. A Pn-sequence may be generated using information encrypted into the compressed image. A Pn-sequence matrix may be generated by segmentation of the Pn-sequence. Using two columns of the Pn-sequence matrix, a correlation of logical operations may be used to retrieve sequence closer to the digital media or signal. The original digital media may be retrieved by randomizing the digital media or signal with respect to pseudo noise sequence generated if it was reconfigured initially.
In one embodiment, the algorithm may be implemented on a processor, where the processor may be any computer-readable media known in the art. For example, it may be embodied internally or externally on a hard drive, ASIC, CD drive, DVD drive, tape drive, floppy drive, network drive, flash drive, USB drive, or the like. The processor is meant to indicate any computing device capable of executing instructions for receiving the data from amongst other functions. In one embodiment, the processor is a personal computer (e.g., a typical desktop or laptop computer operated by a user). In another embodiment, the processor may be a personal digital assistant (PDA) or other handheld computing device.
In some embodiments, the processor may be a networked device and may constitute a terminal device running software from a remote server, wired or wirelessly. Input from a user, detector, or other system components, may be gathered through one or more known techniques such as a keyboard and/or mouse. Output, if necessary, may be achieved through one or more known techniques such as an output file, printer, facsimile, e-mail, web-posting, or the like. Storage may be achieved internally and/or externally and may include, for example, a hard drive, CD drive, DVD drive, tape drive, floppy drive, network drive, USB drive, flash drive, or the like. The processor may use any type of monitor or screen known in the art, for displaying information. For example, a cathode ray tube (CRT) or liquid crystal display (LCD) can be used. One or more display panels may also constitute a display. In other embodiments, a traditional display may not be required, and processor may operate through appropriate voice and/or key commands.
In some respects, a method for producing a compressed and encrypted image is provided. An image may be converted into a binary bit stream, and the bit stream may be decomposed into a plurality of segments (of a fixed length and/or various lengths). A binary sequence based on a first key may be generated and may be used to generate a code matrix. A distance between the code matrix and the distance may be determined for each of the plurality of segments. Using a combined first and second key, a compressed and encrypted image may be obtained.
In other respects, a compressed image of a cover image may be provided. The cover image may be converting the cover image into a binary bit steam. The bit streams may be decomposed into a plurality of segments (e.g., the plurality of segments having various lengths). Next, each of the plurality of segments may be classified using a redundancy of bits based on a first key to generate a plurality of redundant and non-redundant segments. The redundant segments and non-redundant segments may be compressed. In one embodiment, the non-redundant segments may be compressed with low redundancy based on a second key. The combination of the compressed redundant and non-redundant segments may form the compressed image of the cover image.
The terms “a” and “an” are defined as one or more unless this disclosure explicitly requires otherwise.
The term “substantially,” “about,” and its variations are defined as being largely but not necessarily wholly what is specified as understood by one of ordinary skill in the art, and in one-non-limiting embodiment, substantially and its variations refer to ranges within 10%, preferably within 5%, more preferably within 1%, and most preferably within 0.5% of what is specified.
The term “coupled” is defined as connected, although not necessarily directly, and not necessarily mechanically.
The terms “comprise” (and any form of comprise, such as “comprises” and “comprising”), “have” (and any form of have, such as “has” and “having”), “include” (and any form of include, such as “includes” and “including”) and “contain” (and any form of contain, such as “contains” and “containing”) are open-ended linking verbs. As a result, a method or device that “comprises,” “has,” “includes” or “contains” one or more steps or elements possesses those one or more steps or elements, but is not limited to possessing only those one or more elements. Likewise, a step of a method or an element of a device that “comprises,” “has,” “includes” or “contains” one or more features possesses those one or more features, but is not limited to possessing only those one or more features. Furthermore, a device or structure that is configured in a certain way is configured in at least that way, but may also be configured in ways that are not listed.
Other features and associated advantages will become apparent with reference to the following detailed description of specific embodiments in connection with the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
The patent or application file contains at least one drawing executed in color. Copies of this patent or patent application publication with color drawing(s) will be provided by the office upon request and payment of the necessary fee.
The following drawings form part of the present specification and are included to further demonstrate certain aspects of the present invention. The invention may be better understood by reference to one or more of these drawings in combination with the detailed description of specific embodiments presented herein.
FIG. 1 show various bit plane decomposition and a Least Significant Bit (LSB) plane, in accordance with embodiments of the disclosure.
FIG. 2 shows a flow chart of a time domain data hiding technique, in accordance with embodiments of the disclosure.
FIGS. 3A through 3C show images used for embedding secure data, in accordance with embodiments of the disclosure.
FIG. 4 shows a general overview of Pseudo Noise Sequences, in accordance with embodiments of the disclosure.
FIG. 5 shows a flow chart for encoding cover signal or data using Pseudo Noise Sequence into a compressed signal or data (‘Simple Pn-sequence encoder’), in accordance with embodiments of the disclosure.
FIG. 6 shows a flow chart for decoding compressed data using Pseudo Noise Sequence to reconstruct the cover signal or data (‘Simple Pn-sequence decoder’), in accordance with embodiments of the disclosure.
FIGS. 7A through 7C are various images used in an analysis, in accordance with embodiments of the disclosure.
FIG. 8 shows a bit plane decomposition of the red layer of FIG. 7C, in accordance with embodiments of the disclosure.
FIG. 9 shows a bit plane decomposition of the red layer of FIG. 7C represented using a M-sequence, in accordance with embodiments of the disclosure.
FIG. 10 shows an embedding method, in accordance with embodiments of the disclosure.
FIG. 11 shows selecting number of bits to embed based on level of variation, in accordance with embodiments of the disclosure.
FIGS. 12A and 12B show corruption of first-order statistics, in accordance with embodiments of the disclosure.
FIGS. 13A and 13B show results of parameter selection, in accordance with embodiments of the disclosure.
FIG. 14 shows relationship of parameter selection and number of available pixels, in accordance with embodiments of the disclosure.
FIGS. 15A through 15J show test image, in accordance with embodiments of the disclosure.
FIGS. 16A and 16B show graph results of First-Order Stego Capacity Measure, in accordance with embodiments of the disclosure.
FIG. 17 shows an embedded method, in accordance with embodiments of the disclosure.
FIGS. 18A and 18B show noise detection, in accordance with embodiments of the disclosure.
FIGS. 19A and 19B show threshold level settings, in accordance with embodiments of the disclosure.
FIGS. 20A and 20B show exponential relation between threshold and available pixels, in accordance with embodiments of the disclosure.
FIGS. 21A and 21B show test image, in accordance with embodiments of the disclosure.
FIG. 22 shows a plot of histogram difference using adaptive embedding methods, in accordance with embodiments of the disclosure.
FIGS. 23A through 23D show histogram difference of Stego images with 10% information, in accordance with embodiments of the disclosure.
FIGS. 24A through 24D show histogram difference of Stego images with 80% information, in accordance with embodiments of the disclosure.
FIGS. 25A and 25B show histograms, in accordance with embodiments of the disclosure.
FIGS. 26A through 26C show comparison histograms after embedding of 80%, in accordance with embodiments of the disclosure.
FIG. 27 shows a table calculation of FOSCM measure to find a best coverage image, in accordance with embodiments of the disclosure.
FIG. 28 show embeddable areas within an image and a detailed view of allowable altered bits (highlighted) within a block. The left thumbnail shows the natural block and the right shows the highlighted areas, in accordance with embodiments of the disclosure.
FIG. 29 shows a structure of palette based images, in accordance with embodiments of the disclosure.
FIG. 30 includes the root mean square error (RMS) values obtained by comparing different clean images with their corresponding stego images while embedding 6 k of data.
FIG. 31 contains the root mean square error (RMS) values obtained by comparing different clean images with their corresponding stego images while embedding 6 k of data.
DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS
The invention and the various features and advantageous details are explained more fully with reference to the nonlimiting embodiments that are illustrated in the accompanying drawings and detailed in the following description. Descriptions of well known starting materials, processing techniques, components, and equipment are omitted so as not to unnecessarily obscure the invention in detail. It should be understood, however, that the detailed description and the specific examples, while indicating embodiments of the invention, are given by way of illustration only and not by way of limitation. Various substitutions, modifications, additions, and/or rearrangements within the spirit and/or scope of the underlying inventive concept will become apparent to those skilled in the art from this disclosure.
Simultaneous Compression and Encryption of Noise Like Signals
In recent years, the applications of pseudo noise (Pn-) sequence are spreading through various fields and are increasing rapidly. Some particular fields are communications (CDMA), cryptography, signal detection, and identification in multiple-access communication systems. Pn-sequence is unique because of its spectral distribution and noise like qualities of the waveform. A random stream shows similar statistical behavior that of the same size Pn-sequences. The prime advantages of a Pn-sequence are randomness and orthogonality of the sequence shifts which are employed in representation and compression of the random data/media.
Compression of random data is vital and difficult for data that has low redundancy and whose power spectrum is close to noise. In most imaging operations (such as medical, military, etc.) compression of all the bit-planes is vital. Since the least significant bit (LSB) planes data is random or has less redundancy, it is hard to compress using the conventional compression algorithms. Similarly, in steganography, the secured information is embedded in the least significant bit planes of the cover image. Thus, the cover image with the secured data needs to be stored or transmitted over interne. But using conventional compression algorithms, the bit-plane information may be lost or compression of data is not effective.
In most data hiding cases, the stego/secured information needs to transformed or represented such that it is random before embedding into cover digital media. Thus, enhances the security level of the embedded information.
In this disclosure, a novel combined compression and encryption technique for noise like data using pseudo noise (Pn) sequence such as M-, Gold, and Kasami sequence is introduced. First, a set of random sequences may be generated. These Pn-sequences may be broken into various segments of same length as that of input. If the data is redundant, then the data is reconfigured using a Pn-sequence. This decreases the redundancy of input data and thus, makes data more suitable for the compression. These operations may result in a compression and encryption. Further, the proposed algorithm may be applied to various random data used in other applications.
Two Algorithms for Compressing Noise Like Signals
As noted above, compression is a technique that is used to encode data so that the data needs less storage/memory space. Compression of random data is vital in case where data needed to be preserved has low redundancy and whose power spectrum is close to noise. In case of steganographic images, the least significant is of high importance upon compressing with lossy algorithms the LSB might get lost. Since the LSB plane data has low redundancy, lossless compression algorithms may be affecting a good compression ratio. These problems motivated in developing a new class of compression algorithms. In this disclosure, compression technique are provided for compressing random data like noise with reference to known pseudo noise sequence generated using a key. Furthermore, the proposed algorithms can be extended to all kinds of random data used in various applications.
Run length, Huffman code, Arithmetic coding, and the like are effective in compressing data that has redundancy. But if the data to be compressed is not redundant or random in nature, then the existing compression algorithms may not have a high compression ratio. For example, consider various bit-planes of an image as shown in the FIG. 1. In most medical imaging operations compression of all the bit-planes is vital. Since the LSB planes data is random or has less redundancy hence compression ratio using the normal compression algorithms is minimal.
Steganography is a process of secretly embedding secured information in a harmless digital media without changing its perceptual or audible quality. Digital steganography and watermarking are currently active research areas in signal processing that deals with encompassing methods of copyright protection, image authentication, and secured communications. Several algorithms for data hiding in digital media have been proposed in both the time and frequency domain. The present disclosure provides techniques in the time domain where the secured data is embedded in the least significant bit planes (LSB planes) of the cover image. A simple block diagram scheme for embedding secured data into the cover image is as shown in FIG. 2.
For example, consider a LSB plane of a cover image, the secured data to be embedded and the cover image's LSB with the embedded secured data as shown in FIGS. 3A, 3B, and 3C. FIG. 3A shows a least significant bit plane of a cover image. FIG. 3B shows a road map image to be imbedded. FIG. 3C show a LSB after embedding the image shown in FIG. 3B to FIG. 3A. The information in the cover image with stego LSB plane may be random and may have minimal redundancy, therefore, normal compression algorithms are not effective. The cover image with the secured data may need to be stored or transmitted over Internet.
In some embodiments, some particular fields like communications (CDMA), cryptography, and signal detection and identification in multiple-access communication systems need additional or optional image processing. The present disclosure use M-sequence because of the autocorrelation, spectral distribution, and noise like qualities of the waveform for these and other application. A random sequence generated using a pseudo noise generator may be employed in coding the secured data and then is added to LSB plane of the data message. The prime advantages of an M-sequence with a high period are an excellent effect of randomness and associated autocorrelation properties. The PN sequences and M-sequence is described in more details below.
Pseudo Noise (Pn) Sequences
In this disclosure, a compression technique that compresses the random data like noise with reference to binary pseudo noise sequence generated is provided. A first algorithm “Simple Pn-sequence based compression” may utilize a Pn-sequence for representing the random digital media with respect to keys. The logical operations may be considered for decreasing the errors arise during the decoding processing. The total random digital media length may be considered for compressing hence it provides a high compression ratio.
In other respects, a second algorithm, “Multi Pn-sequence based compression” proposes the whole random data may be broken into various segments, allowing for the encoding of any kind of randomness in the digital media. This technique may use a combination of randomizing and compression of the digital media, reducing errors in decoding and can successfully compress any kind of digital media.
In this section, a general definition and overview of the Pseudo Noise (PN) Sequences of the present disclosure is provided. A pseudo noise sequence, as used and defined herein, is a periodic binary sequence that is normally generated using linear feedback shift registers and well defined logic. These sequences may be semi-random, i.e. they are random in a particular period, but after each period, the sequences may repeat itself. The waveform of PN sequences may be similar to noise-like waveform. A Pseudo Noise sequence of sufficient length may have similar properties of a random data stream. The various Pseudo noise sequences that are commonly used are M-sequence, Gold codes and etc., the M-sequence is simplest in form of the pseudo noise sequences. FIG. 4 shows in general, an over view of various pseudo noise sequences.
M-sequence is a pseudo random binary sequence that may be generated by a linear feedback shift register with a generating polynomial (primitive) in which coefficients arise from Galois field. If the period of the pseudo random binary sequence is equal to about 2n−1 (n is the degree of the polynomial), it is called a maximum-length sequence (or M-sequence). An M-sequence may also be defined as a maximum-length shift register sequence. M-sequence is one of the simplest pseudo noise sequences. M-sequence may include various properties including:
    • 1) Runs of M-sequence:—The numbers of runs of one's is equal to runs of zero's. In addition, the number of the total runs of an M-sequence of order “N” is given by
      The total number of runs=2N-1  Eq. 1
      • Note: −½ the runs will be one bit long;
        • ¼ the runs will be 2 bits long;
        • ⅛ the runs will be 3 bits long; up to a single run of zeroes that is ‘N−1’ bits long and a single run of ones that is ‘N’ bits long.
        • Example:—Consider an M-sequence of order “4” of Tap code [3, 4] and then find the total number of runs.
      • Solution:—M-sequence of Tap code [3, 4] is [1 1 1 1 0 0 0 1 0 0 1 1 0 1 0]
      • a) The total runs are 24-1=8. From the above Sequence the runs are shown as [4 3 1 2 2 1 1 1] i.e., 8.
      • b) The Number of runs for ones is 4 and the number of runs for zeros is 4. Hence forth, the number of runs for number of runs for zero.
Runs Zero's One's
4 1
3 1
2 1 1
1 2 2
    • 2) Balance Property:—The number of ones is one more than the number of zeros in an M-sequence of order ‘N’.
      • Example:—Consider an M-sequence of order “4” of Tap code [1, 4] then find the total number of runs.
      • Solution:—M-sequence of Tap code [1, 4] is [1 1 1 1 0 1 0 1 1 0 0 1 0 0 0];
      • a) Number of ones in the above sequence=8;
      • b) Number of zeros in the above sequence=7;
      • Hence forth, number of of zeros+1.
    • 3) Shift and Add property:—It is a well known property in which the modulo-two addition of any two identical M-sequences with different phases generates another identical M-sequence, but with another phase.
      • Example:—Consider an M-sequence of order “4” of Tap code [1, 4] then find the total number of runs.
      • Solution:—M-sequence of Tap code [1, 4] is [1 1 1 1 0 1 0 1 1 0 0 1 0 0 0];
      • The shifted M-sequence after a shift two to right is [1 1 0 1 0 1 1 0 0 1 0 0 0 1 1];
      • Upon Adding both the M-sequence and the shifted M-sequence is:
      • [0 0 1 0 0 0 1 1 1 1 0 1 0 1 1] i.e. a shifted M-sequence with shift of ‘7’ to right.
    • 4) Correlation:—M-sequence has good bi-level auto-correlation characteristics with values of −1 and N, but the cross-correlation property of the M-sequences is relatively poor.
      • Algorithm
In this section, a new class of compression algorithms based on the M-sequence which compress random data (for example, bit-planes with secured information or LSB planes of the cover image) is presented. The block diagram for ‘Simple Pn-sequence encoder’ is presented in FIG. 5.
The general encoding steps of compression algorithm include inputting the digital media or signal and decompose into its binary format representation. Next, a PN-sequence (M-sequence) may be generated from a pseudo noise generator using a key and generate the Pn-sequence matrix. The generated sequence may be correlated and logical operations between two selected columns of a Pn-sequence matrix may be applied to generate a sequence close to the cover signal. The correlation and logical operation step may be repeated with a new sequence code and a selected column of Pn-sequence matrix until fixed iterations are achieved. The binary formats of the new sequence code may be recombined to generate a new compressed image.
The generated compressed image may have no relationship with the cover image. In one embodiment, to retrieve the information from compressed the image may be done by processing the compressed using decoding algorithm and the set of keys. The block diagram for ‘Simple Pn-sequence decoder’ is presented in the FIG. 6.
The general decoding steps include inputting compressed keys and decompose the keys into its binary format representation. A pseudo noise sequence (M-sequence) may be generated from a pseudo noise generator using a key and generate the Pn-sequence matrix. The generated sequence may be correlated and logical operations between two selected columns of a Pn-sequence matrix using the key to retrieve a sequence similar to a cover signal. The correlation and logical operation step may be repeated with a new sequence code and a selected column of Pn-sequence matrix until fixed iterations are achieved. The binary format of final sequence code from the previous step may be recombined to retrieve the cover digital media or signal.
The ‘Simple Pn-sequence based compression algorithm’ may compress random data successfully, however, the decoding algorithm may introduce errors on reconstruction of the original data, and also when the data has high redundancy. The algorithm may not be effective and may introduce a higher amount of errors on reconstruction of data. This motivated in developing ‘Multi Pn-sequence based compression algorithm’ which has similar frame work as ‘Simple Pn-sequence based compression’ algorithm but includes segmentation block and representation blocks in order to over come the above problems discussed above.
Segmentation Block
The segmentation block takes the input M-sequence which may be used as a reference for compressing the data. The segmentation block may be broken into various segments having same length as that of input. In one respect, the number of reference sequences generating multiple Pn-sequences that are defined by a key may be increased. In addition or alternatively, the compression ratio of the data may be increased and the errors arise during the reconstruction of the original data may be decreased. T The segmentation block's output sequences may also defined by a key.
Data Configuration Block
The data configuration block may take the data and Pn-sequence as inputs and reconfigures the data thus decreasing the redundancy of input data and making data more suited for the compression. The ‘Multi Pn-sequence based compression algorithm’ increases the compression ratio and also minimizes the loss of data during the decoding of the compressed data. The general encoding steps of compression algorithm includes inputting digital media or signal and decompose the data into its binary format representation. A pseudo noise sequence (M-sequence) from a pseudo noise generator using a key may be generated and a Pn-sequence matrix by segmentation of sequence may be constructed. The digital media may be reconfigured by randomizing the media with respect to pseudo noise sequence generated. The reconfigured data may be correlated and logical operations may be between two selected columns of Pn-sequence matrix to generate a sequence close to the segmented signals. The correlation and logical operation step may be repeated with a new sequence code and a selected column of Pn-sequence matrix until fixed iterations are achieved. The binary formats of the keys may be recombined to generate a new compressed image.
The general decoding steps of compression algorithm include inputting the compressed keys and decompose the keys into its binary format representation. Next, a pseudo noise sequence (M-sequence) from a pseudo noise generator using a key may be generated and a Pn-sequence matrix may be constructed by segmentation of sequence. For two columns of Pn-sequence matrix a correlation step and a logical operation step may be applied using the key to retrieve a sequence close to the cover signal. The correlation and logical operation step may be repeated with a new sequence code and a selected column of Pn-sequence matrix until fixed iterations of the key are achieved. The original digital media may be retrieved by randomizing the media with respect to pseudo noise sequence generated. Binary formats segments may be recombine to retrieve the reconstructed digital media or signal.
Computer Simulation
For computer simulation, the method of the present disclosure was tested over 50 images of various sizes from NSP lab's image database and various random signals/data. The experimental results are presented for some of the images of various sizes and the random data for varying length. The various images utilized for simulation are shown in FIGS. 7A, 7B, and 7C (FIG. 7A is a road map image, FIG. 7B is a satellite picture of the river, and FIG. 7C is a picture of a little boy). In addition, random digital data generated for various lengths (16 to 512) were tested.
Table 1 below presents the simulation results using ‘Simple Pn-sequence based compression’ algorithms for compressing digital image LSB bit-planes and various lengths of data generated for 3 trials. The various images with varying sizes are utilized and the last three bit-planes are used in simulation testing. ‘Bit-plane 1’ indicates the least significant bit planes and follows. In addition, the simulation results for 3 trials are presented in case of random data since at each trial the randomness of data obtained is different.
TABLE 1
Simulation results using the proposed (‘Simple Pn-sequence based compression’) algorithm
Random
Image Bit- Bit- data
(size) plane1 plane2 Bit_plane3 length Trial 1 Trial 2 Trial 3
Boy 0.869 0.922 0.942 31 0.903 (28) 0.903 (28) 0.742 (23)
image
(512 × 512)
River 0.873 0.915 0.949 63 0.667 (42) 0.857 (54) 0.810 (52)
(256 × 256)
Road map 0.891 0.923 0.959 255  0.824 (210)  0.769 (196)  0.714 (182)
(128 × 128)
From Table 1, the least significant bit planes are effectively compressed. In addition, for high significant bit-planes, the redundancy in the bit plane may increase, thus decreasing the compression ratio. Hence we developed ‘Multi Pn-sequence based’ compression algorithm which randomizes and segments the image information thus decreasing the redundancy. The segmentation block and the data configuration blocks are vital.
For example, a comparison between the bit-planes for FIG. 7C of size 512 by 512 was performed. FIG. 8 shows the original bit-plane decomposition for the red layer of FIG. 7C. FIG. 9 shows the same bit planes of FIG. 7C's red layer after the data is reorganized using the data reconfiguration block. The redundancy in case of high significant bit-planes may be reduced and also the new classes of bit-planes may have similar similarities thus increasing the compression ratio of the whole image.
Table 2 below presents the simulation results using ‘Multi Pn-sequence based compression’ algorithms for compressing digital image LSB bit-planes and various lengths of data generated for 3 trials, in accordance with embodiments of the present disclosure. The various images with varying sizes are utilized and the last three bit-planes are used in simulation testing. ‘Bit-plane 1’ indicates the least significant bit planes and follows. In addition, the simulation results for 3 trials are presented in case of random data since at each trial the randomness of data obtained is different.
TABLE 2
Simulation results using the proposed (‘Multi Pn-sequence based compression’) algorithm
Random
Image Bit- Bit- data
(size) plane1 plane2 Bit_plane3 length Trial 1 Trial 2 Trial 3
Boy 0.924 0.843 0.878 31 0.87096 (27)  0.742 (23) 0.742 (23)
Image
(512 × 512)
River 0.859 0.891 0.913 63 0.714 (45) 0.778 (49) 0.778 (49)
(256 × 256)
Road map 0.885 0.895 0.899 255  0.745 (190)  0.729 (186)  0.761 (194)
(128 × 128)
TABLE 3
Simulation results comparison between the proposed algorithm 1
and algorithm 2 and the Run length coding
Digital Proposed Proposed Run
media algorithm1 algorithm2 length
Boy Bit- 0.869 0.924 1.481
Image plane1
(512 × 512) Bit- 0.922 0.843 1.430
plane2
Bit- 0.942 0.878 1.731
palne3
River Bit- 0.873 0.859 1.483
(256 × 256) plane1
Bit- 0.915 0.891 1.488
plane2
Bit- 0.949 0.913 1.477
palne3
Road map Bit- 0.891 0.885 1.414
(128 × 128) plane1
Bit- 0.923 0.895 1.383
plane2
Bit- 0.959 0.899 1.367
palne3
Table 3 shows the comparison between the proposed algorithms to the convention run length function. The comparison results prove that the run length algorithm actually needs more memory for storing the data than the actual image. For example, for storing the boy's image bit-plane 1′ of size 512 by 512, run length needs a matrix of size 757 by 757 (approximately) where as the proposed algorithm 2 (Multi Pn-sequence based) needs a matrix of size 473 by 473 (approximately), thus showing that the proposed algorithms provide a better compression ratio for random data.
In conclusion, the compression algorithms of the present disclosure, ‘Simple Pn-sequence based’ and ‘Multi Pn-sequence based’ have been presented for compressing random data. Steganographic images least significant is of high importance but compressing using lossy algorithms the LSB plane might get lost. The algorithms are effective in compressing the LSB plane data. In addition, the bit-planes are represented with reference to the Pn-sequence thus making the data more random. This is better suited for compression using the proposed compression algorithms. The amount of memory size required for storing the ‘Boy image bit-plane 1’ with the ‘Simple Pn-sequence based’ algorithm has a size of about 512 by 512, whereas the run length techniques needs a matrix of size about 757 by 757. The ‘Multi Pn-sequence based’ algorithm needs a matrix of size 473 by 473 (approximately). In addition, the compression ratio of the algorithms of the present disclosure may be improved by using conventional compression algorithms for bit-planes with high redundancy of the data (such as most significant bit-planes).
T-order Statistics and Secure Adaptive Steganography
Adaptive steganography is a statistical approach for hiding the digital information into another form of digital media. The goal is to ensure the changes introduced into the cover image remain consistent with the natural noise model associated with digital images. There are generally two classes of steganography—global and local. The global class encompasses all non-adaptive techniques and is the simplest to apply and easiest to detect. The second classification is the local class, which defines most of the present adaptive techniques.
Image steganography is the art of concealing any binary representable digital media into a digital cover image. The information intended to go unseen by intermediate parties is termed the steganographic content. Hidden data formats are to include: audio signals, video files, text documents, as well as other digital images. Currently, steganography techniques can be divided into two distinct classes such as non-adaptive and adaptive methods. Non-adaptive steganography methods are predominantly simple embedding algorithms that at most incorporate a pseudo-random pattern in the embedding of secret information within an image. Such methods belonging to this category are readily available on the internet. WbStego, SecureEngine, and Stool are three of the most commonly referenced and commercially available methods. Embedding approaches such as these make little, if any, acknowledgement to the statistics and visual features associated with the cover image. As a result, the resultant stego image is easily suspected of holding embedded information and very often is susceptible to localization techniques.
The other class of embedding approaches, adaptive steganography, is an ever evolving topic within the scientific field of steganography. There have been numerous adaptive methods proposed over the last few years. Current techniques apply a scanning window measuring local standard deviation. A threshold is set and is the decisive factor in selecting which cover image pixels to use for hiding stego information. A notable limit to the amount of information that may be securely embedded using the given approach is also used.
An alternate image scanning structure using regional segmentation and a complexity measure to adaptively select embedding locations is also currently being used. Additionally, a more intensive approach where considerations are made to retain first and second order statistics is being applied. Histogram frequencies are maintained by modeling the embedding process as a Markov source and modifying the information to be embedded so that it resembles the ideal distribution pertaining to the cover image. There are two limitations generally associated with adaptive embedding techniques: 1) a limited allowable embedding capacity, 2) methods thwarting one type of stego detection tool are vulnerable to another.
The present disclosure provides an adaptive technique that is able to overcome embedding capacity limitations and reduce the revealing artifacts that are customarily introduced when applying other embedding methods. In one respect, a third faction which is the pixel focused class of steganography is used. Applying a new adaptive T-order statistical local characterization, the algorithm may be able to adaptively select the number of bits to embed per pixel. Additionally, a histogram retention process, an evaluation measure based on the cover image and statistical analysis may allow for the embedding of information in a manner which ensures soundness from multiple statistical aspects. Based on the results of simulated experiments, the present disclosure shows how to securely allow an increased amount of embedding capacity, simultaneously avoiding detection by varying steganalysis techniques.
In one respect, a new adaptive embedding technique that has been shown to reduce the probability of detection of steganographic content within digital images. Through directional, local T-order statistical characterization and first order statistical retention, the algorithm may be able to foil steganalysis attempts of different natures and simultaneously increase the allowable embedding capacity. Analysis and guidance are offered by a first-order stego capacity measure (FOSCM) that assists in, for example, the selection of which pixels to use for the embedding of information, the number of pixels to embed per pixel, the selection of which bit layers to hide information, the manner in which to embed information, and/or the selection of a cover image from a database of candidate cover images varying in size, format, and image features.
In other respects, all data acquisition devices incur some level of noise, such as the quantization error introduced by digital cameras. Additionally, the changing frequencies of the color spectrum throughout an image also contribute to the presence of a natural noise level within a digital image. The algorithm may be designed to find locations within an image where these concepts are most prominent. Pixels lying within regions characterized by chaotic variation, not structured variation found in edge pixels, may be identified, and may be further investigated to decide how many bits to embed and which bit layers to use in the embedding process. The algorithm may apply an equivalent amount of analysis in order to enact efforts to retain the first-order statistical structure of the cover image. The fundamental structure of the algorithm can be represented by the block diagram in FIG. 10.
Referring to FIG. 10, the algorithm includes several stages producing an elaborate embedding process. In Stage I, development of T-order statistical directional variation and parameter selection process may be preformed. Steps including, but is not limited to, selection of embedding pixels, selection of number of bits per pixel to embed, and selection of which bit layers to embed in may be performed.
In Stage II, a first-order statistical retention may be performed. Steps include, but are not limited to, first-order stego capacity measure computer simulations, analysis, and conclusions.
Stage I—T-Order Statistical Directional Variation Measure and Parameter Selection Process
The advantage associated with the new measure is the ability to amplify the level of local variation that is associated with the vicinity of a given pixel. One of the foremost complications involved in the formulation of an adaptive steganographic algorithm is integrating a means for allowing the embedded information to be extracted. Specific pixels may be selected to carry stego information. One commonly applied solution is to remove the influence of any pixels that are to be analyzed from the selection process. If bits are only to be changed in the least significant bit layer, than all bits in that layer may be zeroed out or all set to 1. In this manner, local variation measures may be irrelevant to the least significant bits' contribution to the pixel value. When investigating this process closer and when considering the insertion of information into multiple bit layers, there may be a resultant color reduction. Zeroing out the entire least significant bit layer converts all odd valued pixels into even ones. The result may be amplified when multiple bit layers are cleared. The benefit of incorporating a T-order statistical analysis may be an amplification of the local noise measurements. T-order statistics add sensitivity to the local variation measures. Removing the affected bit layers removes variation from the original cover image. The purpose of t-order statistical analysis is to offset this fault to reinstate a more accurate calculation of local variation.
In one respect, an image may be scanned by a window of size 3×3, although other dimensions may be used. A small window may ensure that variation calculation is as local as possible giving an accurate characterization of the information within the vicinity of a pixel. A modified variance may be used as a characterization of the variation within the vicinity of a pixel. Instead of using the mean of the acknowledge intensities, a T-order value may be used as a substitute. The associated equation is given below.
η ( i , j ) = 1 N n = 1 N ( x n - Torder { x } ) 2 , Eq . 2
where η is the variable assigned to the calculated local median-based variance. The location of the pixel of interest within the image is designated by i and j. The set of pixels within the window is x and N is the total number of pixels within the window. The window size used is a 3×3, where the center value is the pixel for which the variation measure is calculated. A small window may be preferred in order to maintain the absolute locality of the variation measure. It may not be rational to consider a pixel as being within a high variation region when the location of such may be actually three pixels away from an area truly containing a sufficient level of noise. Antonymous may be the minimum restriction of the window size. In order to account for variations in all directions, the specified window size may be used. A 2×2 window would only consider four directions compared to the eight directions included in a window of size 3×3. Additionally, the variation measure of a 2×2 sample space would pertain to a pixel whose location was displaced by half a pixel both horizontally and vertically.
The pixel used for the embedding of stego bits may be defined as the best. If the calculated variation for a particular pixel exceeds the threshold by a determined magnitude, the pixel may be used for the insertion of multiple bits. This principle may be the key factor in the increase in the embedding capacity. In addition, to the increase in embedding capacity, the insertion of multiple bits may also assist in the retention of first order statistics. Embedding multiple bits within a cover image pixel essentially results in a reduced number of pixel values that are altered. Thus, there are fewer modifications to the frequencies in the histograms. FIG. 11 demonstrates the general concept behind the adaptive embedding process.
Furthermore, when multiple bits are inserted into a pixel, the reassigned value may be a non-adjacent value, diffusing necessary adjustments to a further distance. Thus, the random spikes introduced by other methods are beneficially avoided. A figure displaying the random spikes that occur within the histogram after embedding stego information is given below in FIGS. 12A (a histogram of stego image) and 12B (a histrogram of a clear copy image).
The importance of the parameter selection process is to ensure an even distribution of stego information throughout the image, dependant on the size of the stego file that is to be embedded. Neglect of this factor in the embedding process may lead to regions in the image carrying a high density of stego information. Concentrated regions of altered pixels make the stego image susceptible to detection and also simplify any localization attempts. To facilitate extraction, information may be embedded from left to right and from top to bottom. Failure to select the proper parameters is demonstrated below in FIGS. 13A (excessively low parameters) and 13B (adaptive parameter selection).
Selection of the parameters may be dependent on two dictating factors. First, the size of the stego file that is to be embedded in number of bits. The second is the degree of magnitude that separates the single bit embedding threshold from the multi-bit embedding threshold. The relationship between the two thresholds and the number of available pixels may be represented by the equation given below.
Π=Δe (-ατχ)+β  Eq. 3.
The number of available pixels Π may be found using the exponential function displayed above. Δ is the total number of pixels in the cover image, α is an image dependent variation factor, β is the ratio of the multi-bit threshold to the single bit threshold, χ is the single bit threshold, and β is the number of pixels with no local variation. This relationship is represented by the 3-dimensional graph below shown in FIG. 14.
There are several factors to consider when determining the values of the parameters. From the perspective of τ which is the ratio of the multi-bit threshold to the single bit threshold, there are benefits and disadvantages to having both a low ratio and a high ratio. Associated with a low value of τ include more multi-bit carrying pixels, a higher image capacity, a higher root mean square error, and/or a reduced number of changes in first-order statistics. Associated with a high value of τ include a reduced number of multi-bit carrying pixels, a lower image capacity, a lower root-mean square error, and/or an increase in number of change in first-order statistics
The root-mean square error is a measure of how much change was introduced into the image and is one manner of rating the probability of detection. The structure of first-order statistics may also be an important aspect to consider when aiming increasing resistance to detection attacks. A means of selecting the best balance between all the factors to be considered is presented in a following section. Histogram retention is another factor that warrants thorough consideration.
A final procedure to consider is the manner in which to embed the information with focus on a pixel and its associated bit layers. Bits may be inserted as far up as into the third least significant bit layer. Given the proper level of measured variation, the insertion of multiple bits and evidently a greater change in the value of a pixel will not be a cause for risen suspicion.
Stage II—First-Order Statistical Retention
Selecting the proper thresholds may predetermine the locations of every pixel that may be used for embedding stego information and once this has been determined, the image may then be prepared for the second stage of the algorithm. One objective of the second stage is to minimize any changes that must be unfortunately introduced into the image during the embedding process. While the insertion of stego information is taking place, records may be created and updated to remember the actions that have taken place. The focus of these efforts may be to retain the structure of the first-order statistics associated with a cover image. Analysis of first-order statistics is a common approach taken by detection methods and making efforts to maintain these characteristics will assist in evading detection. From FIGS. 12A and 12B, it was shown that embedding information without taking precautions adds random spikes to the frequencies of the histogram. In Stage II, a vector may be created monitoring all pixel value changes. When a pixel is to be changed, the vector may be checked and the possible new values which reflect the required bit/bits are queried. The pixel with the lower associated number in the vector may become the new pixel value. The steps defining this procedure are given below.
In one respect, the technique includes identifying associated bit\bits with current qualified pixel. If the result is identical, there is nothing else to do. If not, find the two nearest pixel values with the required bit\bits. Next, a query data vector for recorded values of two nearest pixels may be performed. A conversion from a pixel to pixel value with the lower associated number may be performed. The vector may be updated by incrementing number for the selected pixel value. Finally, the number associated with original value of the converted pixel is decremented and stego bit with appropriate records update may be outputted.
First-Order Stego Capacity Measure (FOSCM)
The First-Order Stego Capacity Measure may enable an optimal decision in the balance between RMSE and first-order statistics. With this measure, the best cover image for a specific stego file among a database of images varying in size, format, and features. Simultaneously, different existing embedding algorithms to determine the optimal performer may be tested. In order to calculate the FOSCM, a histogram may first be created for the stego image and the original cover image. The following equation is then applied.
H = k = 1 K x ( k ) - y ( k ) , Eq . 4
where x and y represent the histograms of the stego and original cover image. K is the total number of possible intensities which for an 8-bit image or color layer is 256. H is simply the sum of all differences introduced by the stego process between the two histograms. Upon derivation of the H value, the FOSCM may be calculated using
Ω = RMSE * H * λ Λ , Eq . 5
where Ω represents the FOSCM. The variable λ is the number of bits resulting from the conversion of the stego file into binary. A is the total number of pixels in the cover image. With the calculation of Ω comes the ability to simultaneously minimize RMSE and altering of first-order statistics.
Computer Simulation and Analysis
Computer simulations can be simulated in MATLAB software package. Raw quick pairs (RQP) and RS-steganalysis detection algorithms may be reduplicated versions of the original algorithms. The various test images used in this analysis are 512×512 color images shown in FIGS. 15A (squirrel), 15B (blue coast), 15C (bluebonnets), 15D (building), 15E (hen and rooster), 15F (Golden Gate Bridge), 15G (fish), 15H (rock), 15I (boy image), and 15J (trolley)
The simulation results show that the presented method is in general immune to LSB detection methods. The ‘Ω’ for cover image shown in FIG. 15D of size 512×512 for various values of ‘T’ & various percentages of embedding information are presented in the table 1. The best T-order value for 10% of hidden information into cover of ‘Building’ is 1. In addition, the best T-order value for 33% of hidden information into cover of ‘Building’ is 2 and the best T-order value for 33% of hidden information into cover of FIG. 15D is 9.
TABLE 4
‘Ω’ value for percentages of hidden for cover ‘Building’ varying T-order values
Hidden T-order values
data %
1 2 3 4 5 6 7 8 9
10% 157.83 463.49 763.66 1139.6 1229.6 1195.6 798.69 450.22 164.63
33% 6210.2 5897.9 6086.4 6037.6 6012.3 6029.5 6227.6 6112.8 6448.3
50% 11367 11194 11601 11381 11199 11521 11283 11086 11059
FIGS. 16 A and 16B show various ‘Ω’ value for varying percentages of hidden for cover FIG. 15E with varying T-order values. FIGS. 16A and 16B illustrates the variations in the ‘Ω’ value for varying percentages (for 10% and 30% of the stego information) is embedded into the cover image. The best T-order value for 10% of hidden information into cover of FIG. 15E is 2. And in case for, the best T-order value for 33% of hidden information into cover of FIG. 15E is 9.
TABLE 5
RQP Steganalysis Attack - Estimated probability of
embedded information in each layer
Blue Coast Cover with 50% hidden information
T- Reliability Estimation
order Ratio
0% 1% 5% 10% 20% 50%
= 1 0.99836 39.42% 9.53% 0.16% 0.27% 1.39% 49.22%
= 2 0.99754 66.76% 15.83% 0.26% 0.37% 1.15% 15.63%
= 3 0.99707 74.96% 17.58% 0.28% 0.37% 0.88% 5.93%
= 4 0.99788 57.07% 13.65% 0.22% 0.35% 1.31% 27.40%
= 5 0.99809 49.43% 11.88% 0.20% 0.32% 1.37% 36.80%
= 6 0.9983 41.58% 10.05% 0.17% 0.28% 1.39% 46.53%
= 7 0.99766 63.79% 15.17% 0.25% 0.37% 1.21% 19.21%
= 8 0.99781 59.37% 14.17% 0.23% 0.35% 1.28% 24.59%
= 9 0.99817 46.57% 11.21% 0.19% 0.31% 1.38% 40.34%
To test the security associated with the new proposed algorithm, implementations of RS steganalysis and Raw Quick Pairs (RQP) may be simulated. Table 5 provides the detection results when applying RQP steganalysis for a ‘blue coast’ cover with 50% hidden information for various t-order values. The results in Table 6 show that in comparison to other embedding techniques, both random and adaptive, the method of the present disclosure is able to avoid detection in all simulations except for one. The clean cover images were also tested to have some manner of control group for comparison with the gathered results.
TABLE 6
RS Steganalysis Attack - Estimated Length of Detected Message
Secure Non- New Method Clean
Engine Adaptive Adaptive II - No LSB Images
Fish
10% 159 1,782 5,008 238 291
Fish 33% 793 11,707 12,022 170 291
Fish 50% 1824 17,105 17,596 1123 291
Gold 10% 4,419 7,125 5,129 160 198
Gold 33% 16,905 7,125 12,876 181 198
Gold 50% 15,939 10,027 18,831 200 198
Rock 10% 9,947 2,585 5,209 685 743
Rock 33% 15,810 12,800 12,675 689 743
Rock 50% 11,782 18,472 17,935 635 743
Boy Image 1,655 808 3,346 −518 −472
10%
Boy Image 2,845 10,378 10,692 −456 −472
33%
Boy Image 3,072 15,248 16,724 −393 −472
50%
Trolley
10% 1,631 1,676 4,641 −18 −46
Trolley 33% 12,060 9,519 12,475 69 −46
Trolley 50% 16,821 13,949 17,394 306 −46
The above provides an adaptive method of steganography that successfully reduces the probability of detection while simultaneously allowing a higher image capacity when compared to other adaptive embedding techniques such as the algorithms presented by Fridrich and Rui as well as existing random embedding methods. This may be accounted to the incorporation of t-order statistics in order to improve upon the sensitivity of the local variation measure calculations to offset the resolution reduction caused by the removal of bit layer information. Using the adaptive multi-bit principle, more information is able to be inserted which has the additional benefit of reducing the necessary changes of necessary first-order statistics as a result of utilizing a reduced number of cover image pixels. Additionally, the adaptive assignment of the threshold in order to allow for an ideal distribution of stego information throughout the image further assists in the decreasing in the risk of detection. Finally, by incorporating a concept presented by Franz, we successfully resist the changing of first-order statistics thwarting any histogram based steganalysis attacks. Figures showing the histograms of outputted images demonstrate the reduction in identifiable artifacts commonly introduced by the embedding process. As an added feature, a First-Order Stego Capacity Measure (FOSCM) has been provided which optimizes the balance between RMSE and disturbances of first-order statistics.
Adaptive Steganography with Increased Embedding Capacity for New Generation of Steganographic Systems
Adaptive steganographic techniques have become a standard direction taken when striving to complicate the detection of secret communication. The consideration of cover image features when embedding information is an effort to insert digital media while keeping the visual and the statistical properties of the cover image intact. There are several such embedding methods in existence today, applicable for different formats of images and with contrasting approaches. In this disclosure, a new adaptive embedding technique which alters the least significant bit layers of an image. This technique is driven by three separate functions: 1) adaptive selection of locations to embed; 2) adaptive selection of number of bits per pixel to embed; and 3) adaptive selection of manner in which the information is inserted. Through the application of sensitive median-based statistical estimation and a recorded account of actions taken, the algorithms may be able to provide the desired level of security, both visually and statistically. In comparison with other methods offering the same level of security, the new technique is able to offer a greater embedding capacity. In addition, for the sake of thorough investigation and fair comparison, a new stego capacity measure which will offer a means of comparing steganography methods applied across different formats of images. Finally, this new algorithm is created with the intention of implementing within the offered capabilities of a wireless mobile device.
In one respect, a new adaptive embedding technique that has been proven to minimize the detection of steganographic media within digital images is provided. Through the application of sensitive median-based statistics, the algorithms may be able to provide a sound level of security while simultaneously increasing image capacity. Analysis is assisted by the use of a new stego capacity measure which offers insight to the relationship between capacity and image modification. Through this measure, the best candidate may be chosen to cover from a database of images with varying sizes, formats, and features.
Information to be embedded may be either done by changing coefficients in the transform domain or, in one embodiment, remaining in the spatial domain and altering the least significant bits of the binary representation of a digital image. The proposed LSB embedding algorithms take advantage of the uncertainty and noise like properties that are associated with certain regions within a candidate cover image. All data acquisition devices, such as digital cameras, incur some level of noise. The changing frequencies of the color spectrum over an image also imitate noise like qualities. The ability to successfully identify regions of an image where this idea is prominent may ensure the failure of detection software attacks. The algorithms for this new adaptive approach are derived from noise identification algorithms proposed by Agaian, Sifuentes, and Lamoroueux. These algorithms use detection measures with increased statistical sensitivity to successfully separate noisy pixels from those naturally associated with the image. Detailed characterization of the surroundings of a pixel give an idea of the best approach, and the amount of information that can be safely embedded at a given pixel location. Additionally, the second stage of the embedding process applies an equal amount of evaluation in working to counteract the revealing statistical artifacts that are introduced from the insertion of stego information. The basis structure of the algorithm is represented by the block diagram in FIG. 17. The presented method may be subdivided into two systems.
Again, the capability of applying fast algorithms and using fixed memory partitions in order to develop a new system for the implementation of steganographic programs is provided. Though steganography is traditionally accomplished using the high processing speeds of a desktop or even notebook computer, recently technology has miniaturized high complexity circuitry giving rise to the convenience of portable and complex processing components. Such advancements are clearly demonstrated in the field of wireless communications. Mobile devices are continuously increasing in the level and quality of services and applications that are offered. With the introduction of mobile platform operating systems, there arises the opportunity to create and develop innovative translations of commonly used processes.
The algorithm includes several stages producing an elaborate embedding process. System I may be used for the development of variation measures and explanation of the threshold derivation process including selection of best locations to embed and/or selection of number of bits per pixel to embed. System II may execute a histogram retention algorithm and embedding process. The algorithm may also include a First-Order Stego Capacity Measure (FOSCM), computer simulations, and/or analysis. Analysis may be done using a database of 100 color and 100 grayscale bitmap images varying in size, color, and classes of image features. Stego files of different size and format may be also used to demonstrate their affects on the detection process. In comparison to the readily available embedding software as well as other existing adaptive embedding methods, the present disclosure's method is shown to perform quite well in maintaining a resistance to detection as well as enabling an increase in the amount of stego capacity. Detection tests were done using implementations of RS Steganalysis and Histogram Quick Frequency.
System I—Variation Measures and Threshold Derivation Process
The primary function of the variation measures may be to form a foundation for the adaptive selection of embedding locations and the number of bits per pixel to embed. This measure may be used as an integral component to the noise detection algorithms. Fundamentally, the objective is to modify the cover data to reflect the binary information to be hidden while ensuring that changes do not exceed the noise threshold. Algorithms intended for the detection of noise corrupted pixels may simply tuned down to the level of detecting natural image noise. FIGS. 18A (image corrupted with Gaussian Noise) and FIG. 18B (clean image) demonstrates the detection of noise both in an image corrupted with Gaussian noise and a clean image.
Pixels considered noisy are represented in gray and edge pixels may be designated in black. Edge pixels also have noise-like characteristics and as a result, may be included for considerations of noise. The clean image with corrupted pixels identified demonstrates the presence of natural noise.
Median-Based Variance as a Variation Measure
The measure we use as a characterization of the variation within the vicinity of a pixel is a modified variance. Instead of using the mean of the acknowledge intensities, we substitute the median value. The associated equation is given below.
η ( i , j ) = 1 N n = 1 N ( x n - median { x } ) 2 , Eq . 6
where η is the variable assigned to the calculated local median-based variance. The location of the pixel of interest within the image is designated by i and j. The set of pixels within the window is x and N is the total number of pixels within the window. The window size used in this application is a 3×3, where the center value is the pixel for which the variation measure is calculated. A small window may be preferred in order to maintain the absolute locality of the variation measure. In one embodiment, it may not be rational to consider a pixel as being within a high variation region when the location of such is actually three pixels away from an area truly containing a sufficient level of noise. Antonymous is the minimum restriction of the window size. In order to account for variations in all directions, a specified window size may be used. A 2×2 window would only consider four directions compared to the eight directions included in a window of size 3×3. Additionally, the variation measure of a 2×2 sample space would pertain to a pixel whose location was displaced by half a pixel both horizontally and vertically.
Selecting Best Locations to Embed Information and Adaptive Multi-Bit Embedding
The determination of the variation measure pertaining to each pixel enables the algorithm to select at which locations would be best to insert information. If the local measures exceed a certain threshold level, the pixel may be deemed as a suitable candidate for the insertion of binary data. If the variation measure is found to exceed the threshold by a determined magnitude, the pixel may facilitate the hiding of multiple bits. This adaptive selection of how many bits per pixel to embed is the foundation of the increased capacity the proposed algorithm is able to offer. Under certain conditions, the noise level at a designated region may be sufficiently high to allow a greater level of modification to the value of a pixel. FIG. 11 demonstrates the general concept behind this process.
Aside from the benefit of an increase in cover image capacity, the idea of embedding multiple bits per pixel also assists in the retention of first-order statistics. Since fewer pixels are modified, there may be a reduced number in modifications of frequencies in the histograms. Furthermore, when embedding multiple bits, often the pixel may be reassigned a value other than the adjacent intensity. Necessary adjustments are diffused at a further distance, counteracting the random spikes that often occur within the histogram with various other techniques. Thus, the increased embedding capacity property is also inherent in the decrease in probability of detection of steganographic activity.
For a given example, a 512×512 grayscale image may be used as the cover media. Stego information was hidden in approximately 75% of the pixels in the cover image. A high percentage of embedded information may be inserted to make the random spikes more visually prominent. The statistical analysis is much more sensitive to histogram frequency characteristics than what is able of the human visual system.
RMSE = 1 N i = 1 N x ( i ) - y ( i ) 2 . Eq . 7
There are benefits to be realized through the application of multiple-bit embedding, but there is also a balance which must be considered. Overuse of the multi-bit embedding concept may dramatically increase the amount of root-mean-square error (RMSE) introduced into the image during the embedding process. A reduced number of pixels may be altered, but a multitude of pixels may altered by a value greater than one. RMSE may be derived from Eq. 7.
Adaptive Threshold Derivation Process
The purpose of the threshold derivation process may be to ensure an even distribution of stego information throughout the image. This process selects the threshold in a manner in which the safest pixels may be used first in relevance to the size of the stego file to be embedded. To facilitate extraction, information may be sequentially embedded from left to right, top to bottom. If the threshold is randomly selected, one may be unsure of the resultant distribution of steganographic data. A very high threshold may not accommodate the amount of space required. Setting the threshold excessively low may result in a higher than necessary density of modified pixels. FIG. 19A (excessively low threshold) and FIG. 19B (adaptive threshold selection) provide an example demonstrating the importance of selecting the proper threshold. Stego containing pixels are represented in black.
The decision of the threshold may be dependant of two variables: the amount of data that is to be inserted, and the magnitude of the difference in thresholds distinguishing single and multi-bit carrying pixels. The relationship between the number of candidate pixels and the threshold value is an exponential function as is displayed in FIGS. 20A and 20B.
The Z axis of the left graphic in FIG. 20A represents the number of pixels that qualify for stego insertion based on a particular threshold value. The Y axis in the left graphic represents the ratio between the single-bit and multi-bit thresholds. The greater the value of this ratio, the sharper the knee in regards to the exponential function. The importance of the incline may be its determination in the level of control over the number of available pixels. Little control results in a reduced ability to find an optimal distribution for stego information. Additionally, a higher ratio may reduce the allowable image capacity and degrade the effectiveness of the multi-bit principle. However, there is an indirect relationship between the ratio and the RMSE value. A higher ratio corresponds to a lower resultant error value. A low ratio results in a smooth and higher curve offering greater control of stego distribution and an increased embedding capacity. The associated negative factor may have an increase in the RMSE value, somewhat contributing to the risk of detection. The decisive factor in the selection for the optimum balance may be the effects of the selected parameters on first-order statistics and a measure for making such decisions is presented in a following section. Associated, histogram retention may be a significant factor crucial to the performance of the proposed algorithm.
System II—Histogram Retention Algorithm and Embedding Process
The selection of the threshold and applied ratio predetermines every location for the insertion of stego information. All the functions of System I may be a required preliminary for the second system. The purpose of histogram retention may be an effort to preserve first-order statistics. Natural digital images may generally produce a smooth histogram, characterized by gradual fluctuations throughout the entire intensity spectrum. As displayed in the previous example presented, steganographic processing has the effect of disrupting this expected behavior. The goal of histogram retention is to minimize this affect and maintain the natural appearance of statistical properties of the image. In order to accomplish this, we create a vector that records all applied pixel modifications. If the opportunity arises to counteract a previous modification, the algorithm may recognize such and enact the rectification. The histogram retention efforts may occur simultaneously with the embedding process. The data vector may be iteratively queried and updated with each transformed pixel. The general procedure of this process is accomplished by applying the following steps to the histogram retention algorithm.
In one embodiment, values of next bit\bits to be embedded may be inputted. Next, an identification step identifying associated bit\bits with current qualified pixel, and if the comparison shows that qualified pixel and bit\bits are identical, there are no further actions to be taken. If the comparison shows that they are not identical, the two nearest pixel values with the required bit/bits may be found. A query data may be used for recording the values of the lower associated number and a vector may be updated by increment number for the selected pixel value. The original value of the converted pixel may be updated by incrementing an update vector. Next, the original value of the converted pixel may be decreased.
First-Order Stego Capacity Measure (FOSCM)
The First-Order Stego Capacity Measure enables an optimal decision in the balance between RMSE and first-order statistics. With this measure, \the best cover image for a specific stego file among a database of images varying in size, format, and features may be found. Simultaneously, different existing embedding algorithms to determine the optimal performer may be tested. In order to calculate the FOSCM, a histogram must first be created for the stego image and the original cover image using, for example, Eq. 4. Upon derivation of the H value, the FOSCM may be calculated using, for example, Eq. 5. With the calculation of Ω comes the ability to simultaneously minimize RMSE and altering of first-order statistics.
Computer Simulation
Computer simulations were simulated in the MATLAB software package. Initial tests were intended to analyze the histogram differences introduced by three different adaptive embedding algorithms. The first method is from the referenced article by Fridrich and Rui. This method may use a normal variance to determine variation measures associated with each pixel. For fair comparison, an optimal threshold derivation for an even distribution of steganographic information may be used.
The second method includes an adaptive, multi-bit capability method without histogram retention processing and the third is our fully adaptive algorithm with histogram retention. The test images used in this analysis are the 512×512 grayscale images displayed in FIG. 21A (fisherman sign) and FIG. 21B (Trolley).
Incremental sizes of stego files may be embedded using each method and the associated H values are plotted in FIG. 22. The X axis in of the figure represents the ratio of number of bits resultant of the binary conversion of the stego data to the number of pixels in the cover image. Percentages from 10% to 80% in increments of 10% were introduced into the cover image. The Y axis of FIG. 22 represents the sum of the magnitude differences between histograms of the original and stego images. The resultant values for each percentage of embedding are represented by three distinguishably formatted plots. The proposed method proves to give the lowest level of histogram modification in comparison to the other adaptive methods. The random embedding method SecurEngine, was excluded from this simulation to reduce graphical clutter but will be acknowledged in the following example to demonstrate its associated deficiencies in comparison to the adaptive methods.
The second example shows the magnitude of the difference for each particular intensity frequency in relation to the original and stego images. The number of bits embedded is 10% of the number of pixels in the cover image. These plots are from steganography embedded into the fishermen test image (FIG. 21A). In FIG. 23A, a proposed histogram is shown. In FIG. 23B is an adaptive method from current technologies. In FIG. 23C is a proposed method without histogram retention. In FIG. 23D is a histrogram from SecurEngine.
In the following histograms, the amount of stego information with up to 80% of the number of pixels in the cover image is tested. The resultant plots are presented in FIG. 24A, a proposed histogram is shown, in FIG. 24B is an adaptive method from current technologies, in FIG. 24C is a proposed method without histogram retention, and in FIG. 24D is a histrogram from SecurEngine.
In combination with the example above, the histograms of the stego image using the proposed method and the stego image using the simple adaptive algorithm by Fridrich and Rui are compared to the histogram of the original image in FIGS. 25A (histogram of a cover image) and 25B (histogram of stego image with best threshold). These histograms, excluding the original cover image, may be embedded with an amount of bits approximately equivalent to 80% of the number of pixels in the cover image.
The final example expresses the extent to which we may embed information and not noticeably alter the ideal histogram. In summary, there is an associated capacity with this permitted boundary. This boundary may be relevant to the region preceding the knee of the exponential function showing the relationship between the threshold and the number of qualified pixels associated with that particular threshold. The optimum secure capacity may be attained by constraining the threshold in the region directly prior to the point in which control of distribution becomes unstable. In relation to the curve on the left of FIG. 14, this region would lie in the threshold range from approximately 50-60. FIG. 26A (original image histogram), 26B (histogram of image after methods of the present disclosure), and 26C (histogram using referenced adaptive method) show the histogram when the threshold is assigned within this region.
Through the use of the FOSCM, the best image for embedding a particular stego file may be selected. FIG. 27 shows the calculated FOSCM values associated with embedding the file into the five test images. The image pertaining to the lowest FOSCM measure is the best image to use as the cover for the specified stego. For this particular test stego file, the best cover image was determined to be the chess match image (4th column).
To further test the security associated of the algorithm, implementations of RS steganalysis and Histogram Quick Frequency was tested. Table 7 gives the detection results when applying RS steganalysis. RS steganalysis is well known to detect even very small stego messages. Given is the detected message length in terms of bytes. 10% pertains to a message length of 3,249. 33% pertains to a message length of 10,816 and 50% pertains to a message length of 16,384.
TABLE 7
RS steganalysis attack - Estimated Length
of Message in Number of Bytes
SecurEngine Adaptive [5] Non-Adap. [5] New Method
Fish
10% 159 1,782 5008 379
Fish 33% 793 11,707 12,022 624
Fish 50% 1824 17,105 17,596 730
Gold 10% 4,419 7,125 5,129 76
Gold 33% 16,905 7,125 12,876 185
Gold 50% 15,939 10,027 18,831 361
Rock 10% 9,947 2,585 5,209 805
Rock 33% 15,810 12,800 12,675 934
Rock 50% 11,782 18,472 17,935 1197
Sarkis 10% 1,655 808 3,346 −288
Sarkis 33% 2,845 10,378 10,692 78
Sarkis 50% 3,072 15,248 16,724 639
Trolley 10% 12,060 1,676 4,641 219
Trolley 33% 16,821 9,519 12,475 711
Trolley 50% 1,631 13,949 17,394 1035
TABLE 8
Histogram Quick Frequency Attack
SecurEngine Adaptive [5] Non-Adap. [5] New Method
Fish
10% N N N N
Fish 33% Y Y N Y
Fish
50% Y Y Y Y
Gold
10% N N N N
Gold 33% Y N N N
Gold
50% Y Y Y N
Rock
10% N N N N
Rock 33% N N Y N
Rock
50% Y Y Y N
Sarkis
10% Y Y Y N
Sarkis 33% Y N Y N
Sarkis
50% Y N N N
Trolley
10% Y Y N N
Trolley 33% N N Y N
Trolley
50% N Y Y N

The above tables were tested using 8-bit grayscale images with dimension 512×512. The RS Steganalysis generally failed to detect the level of information that was actually embedded but succeeded in detecting for almost all other methods of steganography. Similarly, histogram quick frequency detected stego in the new method in the fewest number of trials. Outperformed were SecurEngine, an adaptive method and a random method.
We have presented an adaptive method of steganography that successfully reduces the probability of detection while simultaneously allowing a higher image capacity when compared to other adaptive embedding techniques such as the algorithms presented by Fridrich and Rui as well as existing random embedding methods. Using the adaptive multi-bit principle, more information can be inserted which has the additional benefit of reducing the necessary changes of first-order statistics as a result of utilizing a reduced number of cover image pixels. Additionally, the adaptive assignment of the threshold in order to allow for an ideal distribution of stego information throughout the image further assists in the decreasing the risk of detection. Finally, by incorporating a concept presented by Franz, a first-order statistics thwarting any histogram based steganalysis attacks were not changed. Figures showing the histograms of outputted images demonstrate the reduction in identifiable artifacts commonly introduced by the embedding process. As an added feature, we have introduced the First-Order Stego Capacity Measure (FOSCM) which optimizes the balance between minimizing RMSE and disturbances of first-order statistics. Finally, these algorithms have been formulated in a manner that will accommodate the implementation of such a system within the capabilities of the technology offered by the latest wireless mobile devices. These ideas are currently being further developed to facilitate the transition of created algorithms into the new environment.
Palette-Based Steganography Used for Secure Digital Image Archiving
This section focuses on essential problems faced in digital image archiving. One of the principal objectives is to preserve secure digital media and information for the future. In addition to identifying file formats where storage systems and current technology are still in their infancy research is the key component in maturing these systems. Furthermore, with developing new generation of archiving system, there is a need to have a high capacity embedding methods. The present disclosure stores digital image content within a secure storage preserving the content without allowing an unauthorized third party the ability to view the content even in the event that the security is breached. A new secure high capacity embedding method may be used in a secure multilayer database system for digital image archiving. This steganographic approach has the following advantages: 1) BPCS Steganographic method for palette-based images; 2) provides additional security through a simple selective color and cover image algorithm; 3) provides the closest color substitutes using a weighted distance measure; 4) offers an increased capacity by embedding in N×M blocks sizes; and 5) the secure media storage system contains an independent steganographic method that provides an additional level of security.
There are several algorithms that are used to embed information in cover images. These algorithms use inconspicuous looking carriers that take advantage of the gaps in the human visual and audio systems to hide information. Digital images contain considerable amounts of redundant data; therefore they are ideal carriers used to conceal the presence of secret information. There are many color models used to represent digital images and all of them can be modified to embed information. The most popular color models used for this purposes are the 24-bit RGB or “true-color format” and palette-based color format. True-color images are composed of three layers, corresponding to the primary colors: Red, Blue, and Green. Each color layer is represented using 8-bits for true-color images. Palette based images on the other hand, are represented using an index and a palette. The palette contains all the image's colors while the index contains only addresses that point to a specific location in the palette.
Problems with existing palette steganographic methods are that the information is limited and the hidden message can be destroyed by switching the order of the palettes. In this disclosure, a palette-based steganographic method with increased security and embedding capacity is provided.
Another area of interest is the capacity that digital media can handle before visual and statistical artifacts cause degradation to the cover file. Many steganographic capacitates have been proposed to improve both steganographic embedding and detection processes within media files. Several authors consider capacity from the communications point of view, or consider the capacity as the value of a mutual-information game between the data hider and the attacker, for example 1) data hiding capacity has been calculated as the capacity of the Gaussian channel; 2) the capacity of the data hiding channel has been regarded as intentional jamming for the source of noise; 3) a comprehensive model is described, which analyzes the performance of a proposed scheme for data hiding; 4) estimates data-hiding capacity has been estimated as a maximum rate of reliable transmission, for host-image sources; 5) a theoretic approach has been presented which obtains an estimate of the number of bits that can be hidden in still images, or the capacity of the data-hiding channel; and 6) estimated boundaries have been calculated for steganographic-communication channel capacity.
The method of the present disclosure may be applied to a secure multilayer database system for digital image archiving. This disclosure discusses the necessary background for bit plane complexity measure and the bit plane stego sensitivity measure used for image capacity. Palette based bit plane steganography is described in the third section followed by the computer simulation.
Bit Plane Complexity Measure
This section will introduce some necessary definition needed for the derivation of the stego sensitivity measure and investigation of some measurement properties.
Masks:
Let M R , C = [ ]
be any mask at R, C pixel location. The number of adjacent pixels surrounding a center pixel at the pixel location may be denoted R, C. The binary pixels compared |PR,C−PR-1,C|<1, defined by the mask used and block size. Unlike the complexity measure defined for a given 8-bit color layer, the pixels for each bit plane decomposition may have a difference of less than one. β is an incremental count of the adjacent pixel comparisons that meets the given threshold of one, and βmax the maximum number if all adjacent pixel comparisons meet the threshold within a block size and a moving mask. The same pixels may not to be compared. Other masks as defined in the original complexity measure may be used as well.
Bit Plane Stego Sensitivity Measure
Let I be an image of size N1×N2 and let IB be the bit plane decomposition of an 8-bit color layer. Each of the decomposed bit planes may be divided into blocks, sub bit planes, of M1×M2 from the image IB. Then the pixel comparison based complexity measure for bit plane is defined as:
γ i ( m , n ) = β β max , i = 0 , 1 , , 7 , Eq . 8
where m and n are the block locations being analyzed and i defines the bit plane layer. Each of the bit planes are scanned individually for ideal regions of embedding.
Stego Sensitivity Measure for an individual bit plane is defined by:
Γ i = 1 MN m = 1 M n = 1 N γ i ( m , n ) , i = 0 , 1 , , 7 , Eq . 9
where γi(m, n) are the block values containing all of the complexity values within the image bit plane, N is the number of rows in Γ and M is the number of columns in Γ. Non-zero values are not stored to derive a true threshold for the bit plane.
The general algorithm for calculation of bit plane stego sensitivity measure includes inputting an image of any size to be analyzed for embeddable regions. The image may be divided into color layers followed by a bit plane decomposition step. Next, a block size is determined and the bit plane is divided into analyzed sections. A mask size may be decided. The value of γ for each block may be calculated ensuring the blocks overlap. An initial value for the threshold of Γ may be calculated. Next, γ is determined to see if its value meets the threshold and categorize γ is into embeddable regions. Rows and column location of the embeddable region may be outputted.
The steganographic capacity is used to separate the image into embeddable regions within the image and non-embeddable areas. This is shown in HG. 28 where the highlighted blocks may be considered embeddable areas and the natural spaces are non-embeddable regions. These designations will be used to embed secure information within the embeddable regions.
Palette Based Steganography
In this section, a necessary background for palette based images used for embedding digital content is presented. The capacity measure necessary for embedding is also described in this section.
Due to high redundancy within the image, true-color images have higher embedding capacities. However, palette-based images have been used as cover images to provide a secure and fast transmission/storage over a communication system. Due to their abundance within vast systems, it is difficult to find a suspicious stego-image. Furthermore, since there are alterations introduced by the color reduction and errors in storage, the steganographic message is able to pass as noise. Given that palette-based images have a smaller resolution, they can also be transmitted faster than 24-bit resolution images through a communication channel during archiving.
In order to solve the flaws of existing methods, a new capacity palette-based steganographic approach is presented. Two new practical steganographic including embeddable and non-embeddable capacities are provided. These methods randomly select pixels in the index of an embeddable region within an image and arrange it (using special sorting scheme) in such an order to provide the desired secret key. This method may replace a randomly selected pixel by the closest pixel in the color space that contains the desired parity bit. In addition, the new capacities palette based embedding may be used for 1) separation of a given image into embeddable and non-embeddable areas; 2) identification of the minimum and maximum embedding capacities of a cover digital image; 3) selecting the best cover image from a class of images; and 4) embedding only in selected colors of the palette. This offers the advantage that secures data can be embedded within the index, the palette, or both therefore, adding an extra level of security. This method embeds in the palette by applying sensitivity measure technique previously used for gray scale and color images. This technique is applied to full color images by decomposing the image into its three color layer components within the digital image and treating each layer as a gray scale image. Next, an embedding into one or more of the color components of each layer of the images may be performed. However, even if only one of the color component images is used for embedding, the number of colors in the palette after embedding may be over the maximum number allowed. In order to represent the image data using a proper palette-based format, color quantization may be applied. After information is embedded, it may be imperative that pixel values of the color component contains the embedded information, otherwise the secure data can be lost. Changes may be made to the pixel values of the other two color components within the images. It is assumed that the degrading of the color component image with information embedded is smaller than that of the color component images that are used for color reduction. The human visual system is more sensitive to changes in the luminance of a color. Since G has the largest contribution to luminance of the three color components, information is primarily embedded in this layer. One of the effects caused by this method is that the number of colors in the palette changes. In order to balance the palette to the original number of colors, the R and B components may be modified in a way that minimizes the square error.
Bit Plane Palette Based Stego Sensitivity Measure
This section describes basic methodology for applying the Bit Plane Stego Sensitivity Measure to palette-based images. In addition, we introduce a new improved steganographic method. Finally, some the most common flaw of these algorithms are discussed.
Recently, methods that embed in 24-bit images have been applied to palette-based 8-bit images. This is achieved by changing color models, for example by going from palette-based to RGB method, embedding and going back to the palette-based model. These methods exploit the fact that alterations may be introduced by the color quantization procedure during the transition of one color model to then next. Embedding may take place in these alteration paths or noisy areas. In this approach, a BPSC approach may be used to separate the noisy patterns from informational patterns. The idea is to embed only in noisy patterns leaving the informative areas intact, therefore introducing less noise while embedding. In addition images that embed using BPCS approach are harder to detect. In order to further enhance the quality of the stego image, the information may be embedded in a way that the color that is the most sensitive to changes is not affected. This algorithm however, can not be applied directly to a particular color in the palette-based image. Since the color vectors in a palette are form as a combination of the red, green and blue, the image has to be separated in to its color layers using the RGB color mode. After embedding we most go back to palette-based, this is achieved using color quantization.
The next step in this algorithm is to determine which color is the most sensitive to changes. In some respects, the color green was chosen since it has the most effect on the luminance and the human eye is more sensitive to changes in the luminance. The reason for selecting the most sensitive color layer for embedding is to preserve the luminance information. The information may subsequently be embedded in the noisy areas selected by the binary pattern complexity system.
In other embodiments, a new palette-based steganographic method with improved selective quality and embedding capacity is provided. In this algorithm, a Bit Plane Stego Sensitivity Measure (BPSSM) may be applied to one of the color components that resulted from switching to the RGB model. Next a layer for embedding is selected. It is noted that the best layer can vary depending on the image used. Using the BPSSM, embeddable regions from the selected layer may be extracted. Note, this algorithm may only embed on the selected areas of the best color layer.
The general algorithm for palette based steganography using complexity measures includes an input step for inputting an image of any size to be analyzed. Color values from the image may be obtained and a color layer for embedding may be selected. Embeddable regions using the bit plane stego sensitivity measure may be obtained and may be applied to the selected color layer. A new palette using the best color layer may be produce, while the other layers of the image remain intact. The embedded palette-based image may be outputted.
In most cases, after embedding, the number of color vectors exceeds 256 (0-255) colors. This may be a problem since the maximum color intensity in an 8-bit palette representation is 255. The usage color quantization may guarantee that the new palette will not exceed 256 colors. This process may be achieved without changing the selected color layer, since this is were the secret information lies. In order to begin the color reduction procedure, color vectors that share the same value of the selected color layer may be obtained to make a new table. Using this table, the new color vectors for red and blue may be computed. For example, if selected color layer is a green layer, three red and blue colors that share a green may be obtained and a mean value may be calculated. These values are denoted mean read (MR) and mean blue (MB). For improvement in the reduction method, the square errors to determine which combinations are the best are calculated.
Computer Simulations
In this section, the algorithm of the present disclosure is compared with the BPCS palette based algorithm. Tables 9 and 10 illustrate the differences by incrementing the embedded data. In FIG. 30, the maximum amount of data that it takes to load the image with secure data without causing visual changes was embedded. The same amount of information was embedded using BPCS method the embedded data causes statistical and visual changes within the image. The presented method's maximum capacity while embedding in the lower bit plane layers fluctuated between 9.4k and 13.6k while the BPCS method fluctuated between 5.4k and 8.7k.
TABLE 9
This table contains the RMS values obtained by
comparing the clean and stego Sarkis images
Image-RMS
M Presented Method BPCS Method
4k 0.233 0.242
5k 0.284 6.757
6k 0.325 7.255
7k 3.013 7.260
8k 4.849 8.781
13k  8.961 10.171
TABLE 10
This table contains RMS values obtained by comparing
the clean and stego Golden Gate images.
Image-RMS
M Presented BPCS
4k 0.244 0.249
5k 0.288 9.685
6k 5.180 10.061
7k 8.019 11.842
8k 10.017 13.366
13k  14.001 15.155
In this section, the presented algorithm (using both RGB and YCbCr color formats) was compared with the BPCS palette based algorithm by embedding in 256×256 images. Tables 11 and 12 illustrate the differences by incrementing the embedded data. In FIG. 31, a maximum amount of data that it takes to load the image with secure data without causing visual changes was embedded. The same amount of information using BPCS method was embedded and the embedded data causes more statistical and visual changes within the image than both presented methods (RGB and YCbCr). The presented method's maximum capacity while embedding in the lower bit plane layers fluctuated between 9.4k and 13.6k while the BPCS method fluctuated between 5.4k and 8.7k. The presented method for both RGB and YCbCr color models is better at identifying the noisy regions. The bit plane stego sensitivity measure adaptively selects the best embeddable block within the noisy regions. This is the reason why the presented method has outperformed the BPCS palette based steganography scheme.
TABLE 11
This table contains the RMS values obtained by
comparing the clean and stego boy images.
Presented Presented BPCS
Size RGB YCbCr RGB
4k 0.233 0.246 0.242
5k 0.284 0.287 6.746
6k 0.325 0.331 7.339
7k 3.051 1.885 7.404
8k 4.900 2.545 8.954
13k  9.109 4.330 10.250 
TABLE 12
This table contains the RMS values obtained by
comparing the clean and stego boy images.
Presented Presented BPCS
Size RGB YCbCr RGB
4k 0.233 0.246 0.242
5k 0.284 0.287 6.746
6k 0.325 0.331 7.339
7k 3.051 1.885 7.404
8k 4.900 2.545 8.954
13k  9.109 4.330 10.250
The above section presented a new secure high capacity embedding method used with a secure multilayer database system for digital image archiving. This steganographic approach has shown the following advantages, including bit plane stego sensitivity measure for palette-based images provides a secure and fast transmission/storage over a communication system, offers additional security through a simple selective color and cover image algorithm, provides the closest color substitutes using a weighted distance measure, offers an increased capacity by embedding in N×M adaptive blocks sizes, the secure media storage system contains an independent steganographic method that provides an additional level of security, among other advantages. This method may be used to further enhance the steganographic algorithms utilized for digital image archiving purposes.
Security Considerations
In this section, security issues will be addressed using well know steganalysis techniques. The security of the presented methods was tested using 100 hundred palette-based images using the following methods: Chi-Square, Pairs Analysis, and RS Steganography. These images where embedded using the RGB and YCbCr color models. The analysis shows that the presented method is completely immune to the Chi Square and Pairs Analysis steganalysis methods. However, RS Steganalysis detected hidden information within the green layer of cover images that were embedded using the RGB color model (see Table 15). To improve the security of the presented method information was hidden using the luminance layer of the YCbCr color model to embed (see Table 16).
TABLE 13
This table contains the averages of the detection percentage results of
100 512 × 512 palette based images using Chi Square Steganalysis.
0% 1% 3% 6% 12% 23% 40% 76% 95%
Average 0.01% 0.04% 0.13% 0.26% 0.53% 1.03% 1.82% 3.57% 4.41%
Stego
Detected
TABLE 14
This table contains the averages of the detection percentage results of
100 512 × 512 palette based images using Pairs Analysis.
0% 1% 3% 6% 12% 23% 40% 76% 95%
Average 1.85% 3.11% 2.96% 5.17% 5.38% 4.24% 4.02% 7.66% 9.60%
Stego
Detected
TABLE 15
This table contains the averages of the detection percentage results of
100 512 × 512 palette based images using RS Steganalysis.
This images where embedded in the RGB color model.
Detection Cover
Embedded Detection Clean Image Differences
% Red Green Blue Red Green Blue Red Green Blue
 1% 2.93% 2.68% 2.74% 2.93%  2.94% 2.74% 0.00%  0.26% 0.00%
 3% 2.93% 2.68% 2.74% 2.93%  3.41% 2.74% 0.00%  0.74% 0.00%
 6% 2.93% 2.68% 2.74% 2.93%  4.43% 2.74% 0.00%  1.75% 0.00%
12% 2.93% 2.68% 2.74% 2.93%  6.39% 2.74% 0.00%  3.72% 0.00%
23% 2.93% 2.68% 2.74% 2.93% 11.25% 2.74% 0.00%  8.57% 0.00%
40% 2.93% 2.68% 2.74% 2.93% 18.59% 2.74% 0.00% 15.92% 0.00%
76% 2.93% 2.68% 2.74% 4.08% 36.70% 2.87% 1.15% 34.03% 0.13%
95% 2.93% 2.68% 2.74% 3.41% 42.51% 3.04% 0.49% 39.83% 0.30%
TABLE 16
This table contains the averages of the detection percentage results of
100 512 × 512 palette based images using RS Steganalysis.
This images where embedded in the YCbCr color model.
Detection Cover
Embedded Detection Clean Image Differences
% Red Green Blue Red Green Blue Red Green Blue
 1% 2.93% 2.68% 2.74% 4.00% 3.58% 4.95% 1.08% 0.91% 2.21%
 3% 2.93% 2.68% 2.74% 4.03% 3.53% 4.91% 1.10% 0.85% 2.18%
 6% 2.93% 2.68% 2.74% 4.05% 3.41% 4.77% 1.13% 0.74% 2.03%
12% 2.93% 2.68% 2.74% 3.95% 3.24% 4.59% 1.03% 0.57% 1.85%
23% 2.93% 2.68% 2.74% 3.98% 3.24% 4.34% 1.05% 0.57% 1.60%
40% 2.93% 2.68% 2.74% 3.60% 3.03% 4.18% 0.67% 0.35% 1.44%
76% 2.93% 2.68% 2.74% 3.58% 3.74% 4.13% 0.66% 1.07% 1.39%
95% 2.93% 2.68% 2.74% 4.09% 6.41% 3.79% 1.16% 3.74% 1.05%
In this disclosure, a new, secure, high capacity embedding method capable of embedding in multiple bit-planes using different color model is provided. This steganographic approach has shown the following advantages: 1) bit plane stego sensitivity measure for palette-based images provides a secure and fast transmission/storage over a communication system; 2) Offers additional security through a simple selective color and cover image algorithm; 3) Offers an increased capacity by embedding in N×M adaptive blocks sizes; 4) Offers the option of working with different color models; and 5) secure media storage system contains an independent steganographic method that provides an additional level of security. This method can be used to further enhance the steganographic algorithms utilized for secure digital image transmission.
The methods of the present disclosure may be performed using executable instructions. For example, a computer code for implementing all or parts of this disclosure may be used. The code may be housed on any computer capable of reading such code as known in the art. For example, it may be housed on a computer file, a software package, a hard drive, a FLASH device, a USB device, a floppy disk, a tape, a CD-ROM, a DVD, a hole-punched card, an instrument, an ASIC, firmware, a “plug-in” for other software, web-based applications, RAM, ROM, etc. The computer code may be executable on any processor, e.g., any computing device capable of executing instructions for traversing a media stream. In one embodiment, the processor is a personal computer (e.g., a desktop or laptop computer operated by a user). In another embodiment, processor may be a personal digital assistant (PDA) or other handheld computing devices.
In some embodiments, the processor may be a networked device and may constitute a terminal device running software from a remote server, wired or wirelessly. Input from a source or other system components may be gathered through one or more known techniques such as a keyboard and/or mouse. Output, if necessary, may be achieved through one or more known techniques such as an output file, printer, facsimile, e-mail, web-posting, or the like. Storage may be achieved internally and/or externally and may include, for example, a hard drive, CD drive, DVD drive, tape drive, floppy drive, network drive, flash, or the like. The processor may use any type of monitor or screen known in the art, for displaying information. For example, a cathode ray tube (CRT) or liquid crystal display (LCD) can be used. One or more display panels may also constitute a display. In other embodiments, a traditional display may not be required, and the processor may operate through appropriate voice and/or key commands.
With the benefit of the present disclosure, those having ordinary skill in the art will comprehend that techniques claimed here may be modified and applied to a number of additional, different applications, achieving the same or a similar result. The claims cover all such modifications that fall within the scope and spirit of this disclosure.

Claims (9)

1. A method comprising:
providing a cover image;
converting the cover image into a binary bit stream;
decomposing the binary bit stream into a plurality of segments;
generating a binary sequence based on a first key;
generating a code matrix based on all combinations within the binary sequence;
determining a distance between the code matrix and each of the plurality of fixed length segments to develop a second key;
combining the first key and second key to produce a compressed and encrypted image of the cover image.
2. The method of claim 1, where converting the cover image comprises:
decomposing the cover image into color layers;
decomposing each color layers into a combination of various binary layers; and
reformatting the various binary layers into a single binary vector.
3. The method of claim 1, where generating a binary sequence comprises generating a binary sequence with M-sequence or a Gold codes.
4. The method of claim 1, where generating a binary sequence comprises generating a binary sequence with low redundancy.
5. The method of claim 1, where decomposing the bit stream comprises decomposing the binary bit stream into a plurality of fixed length segments or varying length segments.
6. A method comprising:
providing a cover image;
converting the cover image into a binary bit steam;
decomposing the binary bit stream into a plurality of segments;
classifying each of the plurality of segments into classes using a redundancy of bits based on a first key to generate a plurality of redundant and non-redundant segments;
compressing the redundant segments;
compressing the non-redundant segments with low redundancy based on a second key;
combining the compressed redundant segments and non-redundant segments to form a compressed image of the cover image.
7. The method of claim 6, where compressing the non-redundant segments comprises:
generating a code matrix based on all possible combinations within the binary bit stream;
determining a distance between the code matrix and each of the plurality of segments to develop a third key; and
combining the first, second, and third keys to form compressed and encrypted segments.
8. The method of claim 6, further comprising transforming the plurality of segments based on a fourth key.
9. The method of claim 6, further comprising error correcting encoding the determined distance and each of the plurality of segments to develop the third key.
US11/740,742 2006-04-26 2007-04-26 Methods and systems for digital image security Active 2030-01-24 US7965861B2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US11/740,742 US7965861B2 (en) 2006-04-26 2007-04-26 Methods and systems for digital image security
US13/134,062 US8369568B2 (en) 2006-04-26 2011-05-27 Methods and systems for digital image security

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US74572906P 2006-04-26 2006-04-26
US11/740,742 US7965861B2 (en) 2006-04-26 2007-04-26 Methods and systems for digital image security

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/134,062 Division US8369568B2 (en) 2006-04-26 2011-05-27 Methods and systems for digital image security

Publications (2)

Publication Number Publication Date
US20080130883A1 US20080130883A1 (en) 2008-06-05
US7965861B2 true US7965861B2 (en) 2011-06-21

Family

ID=39475773

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/740,742 Active 2030-01-24 US7965861B2 (en) 2006-04-26 2007-04-26 Methods and systems for digital image security
US13/134,062 Active US8369568B2 (en) 2006-04-26 2011-05-27 Methods and systems for digital image security

Family Applications After (1)

Application Number Title Priority Date Filing Date
US13/134,062 Active US8369568B2 (en) 2006-04-26 2011-05-27 Methods and systems for digital image security

Country Status (1)

Country Link
US (2) US7965861B2 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090136032A1 (en) * 2007-11-26 2009-05-28 Kyocera Mita Corporation Image reading apparatus and image forming apparatus
US9208534B2 (en) * 2014-05-07 2015-12-08 Cisco Technology Inc. System and method for embedding data
US20180288415A1 (en) * 2015-06-09 2018-10-04 Microsoft Technology Licensing, Llc Robust encoding/decoding of escape-coded pixels in palette mode
US20190363876A1 (en) * 2014-06-18 2019-11-28 James C. Collier Methods and Apparatus for Cryptography
US10506254B2 (en) 2013-10-14 2019-12-10 Microsoft Technology Licensing, Llc Features of base color index map mode for video and image coding and decoding
US10542274B2 (en) 2014-02-21 2020-01-21 Microsoft Technology Licensing, Llc Dictionary encoding and decoding of screen content
US10785545B2 (en) 2012-04-20 2020-09-22 The Board Of Regents Of The University Of Texas System Systems and methods for simultaneous compression and encryption
US10812817B2 (en) 2014-09-30 2020-10-20 Microsoft Technology Licensing, Llc Rules for intra-picture prediction modes when wavefront parallel processing is enabled

Families Citing this family (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2447890T3 (en) * 2007-02-05 2014-03-13 Nds Limited Data integration system
US8200959B2 (en) 2007-06-28 2012-06-12 Cisco Technology, Inc. Verifying cryptographic identity during media session initialization
US8650402B2 (en) * 2007-08-17 2014-02-11 Wong Technologies L.L.C. General data hiding framework using parity for minimal switching
US8417942B2 (en) 2007-08-31 2013-04-09 Cisco Technology, Inc. System and method for identifying encrypted conference media traffic
US8837598B2 (en) * 2007-12-28 2014-09-16 Cisco Technology, Inc. System and method for securely transmitting video over a network
US20090169001A1 (en) * 2007-12-28 2009-07-02 Cisco Technology, Inc. System and Method for Encryption and Secure Transmission of Compressed Media
WO2010005181A2 (en) * 2008-06-16 2010-01-14 Lg Electronics Inc. Cooperative symbol level network coding in multi-channel wireless networks
DE102009033919A1 (en) * 2009-07-20 2011-01-27 Giesecke & Devrient Gmbh Secure display of user data on a telecommunication terminal
US8447102B2 (en) * 2009-09-02 2013-05-21 Sony Corporation Vector embedded graphics coding
US8938157B2 (en) * 2010-02-23 2015-01-20 City University Of Hong Kong Digital chip and method of operation thereof
JP4950316B2 (en) * 2010-02-26 2012-06-13 楽天株式会社 DATA GENERATION DEVICE, DATA GENERATION METHOD, AND DATA GENERATION PROGRAM
US8588461B2 (en) * 2010-03-22 2013-11-19 Brigham Young University Robust watermarking for digital media
US9634690B2 (en) 2010-09-30 2017-04-25 Alcatel Lucent Method and apparatus for arbitrary resolution video coding using compressive sampling measurements
US8929456B2 (en) 2010-09-30 2015-01-06 Alcatel Lucent Video coding using compressive measurements
US8774451B2 (en) * 2011-04-28 2014-07-08 King Abdul Aziz City for Science and Technology (KACST) Method and apparatus for embedding a watermark image in a host image
JP5656082B2 (en) * 2011-05-25 2015-01-21 株式会社日立ソリューションズ Image processing apparatus, image generation apparatus, image processing method, and image generation method
US20130156256A1 (en) * 2011-06-21 2013-06-20 Travis Nicks Steganographic encoding and verification
WO2013000057A1 (en) * 2011-06-27 2013-01-03 Canadian Bank Note Company, Limited Encoding hidden information in spatial line frequencies
US9398310B2 (en) 2011-07-14 2016-07-19 Alcatel Lucent Method and apparatus for super-resolution video coding using compressive sampling measurements
US20130044818A1 (en) * 2011-08-19 2013-02-21 Alcatel-Lucent Usa Inc. Method And Apparatus For Video Coding Using A Special Class Of Measurement Matrices
CN103810664B (en) * 2012-11-13 2017-06-27 中兴通讯股份有限公司 A kind of information concealing method and device
US10055551B2 (en) * 2013-10-10 2018-08-21 Board Of Regents Of The University Of Texas System Systems and methods for quantitative analysis of histopathology images using multiclassifier ensemble schemes
US9563806B2 (en) 2013-12-20 2017-02-07 Alcatel Lucent Methods and apparatuses for detecting anomalies using transform based compressed sensing matrices
US9600899B2 (en) 2013-12-20 2017-03-21 Alcatel Lucent Methods and apparatuses for detecting anomalies in the compressed sensing domain
US9894324B2 (en) 2014-07-15 2018-02-13 Alcatel-Lucent Usa Inc. Method and system for modifying compressive sensing block sizes for video monitoring using distance information
CN105303510B (en) 2014-07-31 2019-04-16 国际商业机器公司 The method and apparatus of hiding information in the picture
US10949504B2 (en) 2015-06-04 2021-03-16 Datchat, Inc. Systems and methods of transforming electronic content
US10387674B2 (en) * 2015-06-04 2019-08-20 Datchat, Inc. Systems and methods of transforming electronic content
RU2584454C1 (en) * 2015-07-05 2016-05-20 Борис Юрьевич Гайворонский Method of coding information
RU2598784C1 (en) * 2015-07-17 2016-09-27 Закрытое акционерное общество Научно-технический центр "Модуль" Method of encrypting messages transmitted by means of noise-like signals
RU2595953C1 (en) * 2015-08-04 2016-08-27 Акционерное общество "Концерн радиостроения "Вега" Method for arithmetic encoding with encryption
CN105160694B (en) * 2015-10-15 2017-05-03 深圳大学 Data hiding method and data hiding system
CN106204411B (en) * 2016-07-15 2019-04-02 兰州交通大学 Vector settlement place Zero watermarking method based on not bending moment and Hilbert code
US11057192B2 (en) * 2017-01-31 2021-07-06 Agency For Science, Technology And Research Method and apparatus for generating a cover image for steganography
US11257198B1 (en) * 2017-04-28 2022-02-22 Digimarc Corporation Detection of encoded signals and icons
DE102017110892A1 (en) 2017-05-18 2018-11-22 Kurz Digital Solutions Gmbh & Co. Kg Method for authenticating an item, in particular a security item, and security item
CN110232285B (en) * 2019-06-19 2021-02-26 首都师范大学 Image encryption method and device
US11734784B2 (en) * 2019-11-14 2023-08-22 Sony Interactive Entertainment Inc. Metadata watermarking for ‘nested spectating’
CN111507475A (en) * 2020-04-14 2020-08-07 杭州浮云网络科技有限公司 Game behavior decision method, device and related equipment
CN112202984B (en) * 2020-09-25 2022-04-08 中国人民武装警察部队工程大学 Ciphertext domain reversible information hiding method based on error correction redundancy
US11699209B2 (en) * 2020-10-22 2023-07-11 Huawei Cloud Computing Technologies Co., Ltd. Method and apparatus for embedding and extracting digital watermarking for numerical data
CN112637441B (en) * 2020-12-14 2022-07-29 天津大学 Color image compression encryption method based on compressed sensing
CN112529586B (en) * 2020-12-15 2023-07-28 深圳市快付通金融网络科技服务有限公司 Transaction information management method, device, equipment and storage medium
CN113489859B (en) * 2021-06-10 2023-07-14 绍兴聚量数据技术有限公司 Reversible information hiding method on encrypted image using adaptive coding
CN113469869B (en) * 2021-09-03 2021-11-12 武汉华工安鼎信息技术有限责任公司 Image management method and device
CN113904764B (en) * 2021-09-18 2023-06-16 大连大学 Image encryption method based on multi-scale compressed sensing and Markov model
CN115941855B (en) * 2023-03-10 2023-06-09 聊城市洛溪信息科技有限公司 Safe storage method of social image data

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070033419A1 (en) * 2003-07-07 2007-02-08 Cryptography Research, Inc. Reprogrammable security for controlling piracy and enabling interactive content

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6785814B1 (en) * 1998-07-28 2004-08-31 Fuji Photo Film Co., Ltd Information embedding method and apparatus
FR2849563B1 (en) * 2002-12-31 2005-02-11 Medialive CUSTOMIZED MARKING FOR THE PROTECTION OF DIGITAL AUDIOVISUAL STREAMS
US7333244B2 (en) * 2004-01-16 2008-02-19 International Business Machines Corporation Method and system for embedding an image into two other images

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070033419A1 (en) * 2003-07-07 2007-02-08 Cryptography Research, Inc. Reprogrammable security for controlling piracy and enabling interactive content

Non-Patent Citations (39)

* Cited by examiner, † Cited by third party
Title
Abdat and Bellanger, "Combining gray coding and JBIG for lossless image compression," Proceedings of IEEE International Conference on Image Processing, 3:851-855, 1994.
Agaian and Cai, "New multilevel DCT, feature vectors, and universal blind steganalysis," Security, Steganography, and Watermarking of Multimedia Contents VII, 5681:653-663, 2005.
Agaian and Cherukuri, "Secure and robust steganographic algorithm for binary images," Proceedings of Society of Photo-optical Instrumentation Engineers, the International Society for Optical Engineering, 6235:F1-F10, 2006.
Chen et al., "A new data hiding method in binary image," Proceedings of the IEEE Fifth International Symposium on Multimedia Software Engineering, 88-93, 2003.
Cheng et al., "Steganalysis of binary text images," Proceedings on IEEE International Conference on Acoustics, Speech, and Signal Processing, 4:689-692, 2005.
Cohn and Lempel, "On fast m-sequence transforms," IEEE Transactions on Information Theory, 23:135-137, 1977.
Crandall, "Some notes on steganography," posted on http://os.inf.tu-dresden.de/~westfeld/crandall.pdf, Steganography Mailing List, 1998.
Crandall, "Some notes on steganography," posted on http://os.inf.tu-dresden.de/˜westfeld/crandall.pdf, Steganography Mailing List, 1998.
Dumitrescu and Wu, "Steganalysis of LSB embedding in multimedia signals," Proceedings of IEEE International Conference on Multimedia Expo, 1:581-584, 2002.
Fridrich et al., "Lossless data embedding for all image formats," Proceedings of SPIE Photonics West, Security and Watermarking of Multimedia Contents, 4675:572-583, 2002.
Fridrich et al., "Writing on wet paper," IEEE Transactions on Signal Processing , 53(10):3923-3935, 2005.
Hill and Ridley, "Blind estimation of direct-sequence spread spectrum m-sequence chip codes," IEEE on 6th Int. Symp. On Spread-Spectrum Tech. & Appli., 1:305-309, 2000.
Huffman, "A method for the construction of minimum-redundancy codes," Proceedings of the I.R.E., 40(9):1098-1101, 1952.
Hwang and Chang, "A run-length mechanism for hiding data into binary images," Proceedings of Pacific Rim Workshop on Digital Steganography, 71-74, 2002.
Kawaguchi and Eason, "Principle and applications of BPCS-steganography," International Symposium on Voice, Video, and Data Communications, 1998.
Kuroki et al., "Adaptive arithmetic coding for image prediction errors," Proceedings of the International Symposium on Circuits and Systems, 3:961-964, 2004.
Lee and Chen, "High capacity image steganographic model," IEE Proc.-Vis. Image Signal Process., 147(3):288-294, 2000.
Lin, "'Shift and add' property of m-sequences and its application to channel characterisation of digital magnetic recording," IEE Proceedings-Communications, 142(3):135-140, 1995.
Lötter and Linde, "A comparison of three families of spreading sequences for CDMA applications," Proceedings of the 1994 IEEE South African Symposium on Communications and Signal Processing, 68-75, 1994.
Lu et al., "An objective distortion measure for binary document images based on human visual perception," Proceedings on 16th International Conference on Pattern Recognition, 4:239-242, 2002.
Neeta and Snehal, "Implementation of LSB steganography and its evaluation for various bits," First International Conference on Digital Information Management, 173-178, 2006.
Niimi et al., "Luminance quasi-preserving color quantization for digital steganography to palette-based images," Proceedings of the 16th International Conference on Pattern Recognition, 1:251-254, 2002.
Provos and Honeyman, "Hide and seek: An introduction to steganography," IEEE Security & Privacy, 1(3):32-44, 2003.
Sharp, "An implementation of key-based digital signal steganography," Information Hiding, 2137:13-26, 2001.
Sutter, "The fast m-Transform: A fast computation of cross-correlations with binary m-Sequences," SIAM J. Comput., 20(4):686-694, 1991.
Swanson et al., "Multimedia data-embedding and watermarking technologies," Proceedings of the IEEE, 86(6):1064-1087, 1998.
Tirkel et al., "Image watermarking," IEEE International Symposium on Spread Spectrum Techniques and Applications, Mainz Germany, 785-789, 1996.
Tsai et al., "Data hiding of binary images using pair-wise logical computation mechanism," IEEE International Conference on Multimedia and Expo, 2:951-954, 2004.
Tseng and Pan, "Data hiding in 2-color images," IEEE Transactions on Computers, 51(7):873-878, 2002.
Tseng and Pan, "Secure and invisible data hiding in 2-color images," Proceedings of Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, 2:887-896, 2001.
Tseng et al., "A secure data hiding scheme for binary images," IEEE Transactions on Communications, 50(8):1227-1231, 2002.
Valova and Kosugi, "Hadamard-based image decomposition and compression," IEEE Transactions on Information Technology in Biomedicine, 4(4):306-319, 2000.
Wu and Liu, "Data hiding in binary image for authentication and annotation," IEEE Transactions on Multimedia, 6(4):528-538, 2004.
Wu and Tsai, "Spatial-domain image hiding using image differencing," IEE Proc. Vis. Image Signal Process., 147(1):29-37, 2000.
Wu et al., "Handling uneven embedding capacity in binary images," Security, Steganography, and Watermarking of Multimedia Contents VII, 5681:194-205, 2005.
Yang and Kot, "Data hiding for bi-level documents using smoothing technique," Proceedings of the 2004 International Symposium on Circuits and Systems, 5:692-695, 2004.
Zhi and Fen, "Detection of random LSB image steganography," IEEE 60th Vehicular Technology Conference, 3:2113-2117, 2004.
Zhi and Fen, "Detection of random LSB image steganography," IEEE 60thVehicular Technology Conference, 3:2113-2117, 2004.
Zongqing and Hongbin, "A new data hiding method in binary images," Proceedings of the First International Conference on Innovative Computing, Information and Control, 3:66-69, 2006.

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090136032A1 (en) * 2007-11-26 2009-05-28 Kyocera Mita Corporation Image reading apparatus and image forming apparatus
US10785545B2 (en) 2012-04-20 2020-09-22 The Board Of Regents Of The University Of Texas System Systems and methods for simultaneous compression and encryption
US10506254B2 (en) 2013-10-14 2019-12-10 Microsoft Technology Licensing, Llc Features of base color index map mode for video and image coding and decoding
US10542274B2 (en) 2014-02-21 2020-01-21 Microsoft Technology Licensing, Llc Dictionary encoding and decoding of screen content
US9881350B2 (en) 2014-05-07 2018-01-30 Cisco Technology, Inc. System and method for embedding data
US9208534B2 (en) * 2014-05-07 2015-12-08 Cisco Technology Inc. System and method for embedding data
US20190363876A1 (en) * 2014-06-18 2019-11-28 James C. Collier Methods and Apparatus for Cryptography
US10812817B2 (en) 2014-09-30 2020-10-20 Microsoft Technology Licensing, Llc Rules for intra-picture prediction modes when wavefront parallel processing is enabled
US20180288415A1 (en) * 2015-06-09 2018-10-04 Microsoft Technology Licensing, Llc Robust encoding/decoding of escape-coded pixels in palette mode
US10659783B2 (en) * 2015-06-09 2020-05-19 Microsoft Technology Licensing, Llc Robust encoding/decoding of escape-coded pixels in palette mode
US20200244962A1 (en) * 2015-06-09 2020-07-30 Microsoft Technology Licensing, Llc Robust encoding/decoding of escape-coded pixels in palette mode
US11539956B2 (en) * 2015-06-09 2022-12-27 Microsoft Technology Licensing, Llc Robust encoding/decoding of escape-coded pixels in palette mode
US20230091602A1 (en) * 2015-06-09 2023-03-23 Microsoft Technology Licensing, Llc Robust encoding/decoding of escape-coded pixels in palette mode

Also Published As

Publication number Publication date
US20080130883A1 (en) 2008-06-05
US20110228973A1 (en) 2011-09-22
US8369568B2 (en) 2013-02-05

Similar Documents

Publication Publication Date Title
US7965861B2 (en) Methods and systems for digital image security
Rustad et al. Inverted LSB image steganography using adaptive pattern to improve imperceptibility
Wang et al. Reversible data hiding in encrypted images with block-based adaptive MSB encoding
Wang et al. A majority-voting based watermarking scheme for color image tamper detection and recovery
Chang et al. High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding
Hameed et al. A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques
Lefèvre et al. Efficient image tampering localization using semi-fragile watermarking and error control codes
Bateman et al. Image steganography and steganalysis
Wu et al. A high capacity reversible data hiding scheme with edge prediction and difference expansion
He et al. Flexible spatial location-based PVO predictor for high-fidelity reversible data hiding
Weng et al. High capacity reversible data hiding in encrypted images using SIBRW and GCC
Coatrieux et al. A low distorsion and reversible watermark: application to angiographic images of the retina
JP2000228721A (en) Method for inserting watermark and authenticating digital signal
Wu et al. Image steganography scheme using chaos and fractals with the wavelet transform
Wang et al. Privacy-preserving reversible data hiding based on quad-tree block encoding and integer wavelet transform
Panchikkil et al. A convolutional neural network model based reversible data hiding scheme in encrypted images with block-wise Arnold transform
Hu et al. Tamper detection and image recovery for BTC-compressed images
Pateux et al. Practical watermarking scheme based on wide spread spectrum and game theory
Cavagnino et al. High capacity reversible data hiding and content protection for radiographic images
Baziyad et al. Toward stronger energy compaction for high capacity dct-based steganography: a region-growing approach
Barani et al. Image forgery detection in contourlet transform domain based on new chaotic cellular automata
Vinoth Kumar et al. Encrypted separable reversible watermarking with authentication and error correction
Niu et al. GIS watermarking: hiding data in 2D vector maps
Nguyen et al. Effective reversible image steganography based on rhombus prediction and local complexity
Naskar et al. Reversible digital watermarking: theory and practices

Legal Events

Date Code Title Description
AS Assignment

Owner name: THE BOARD OF REGENTS OF THE UNIVERSITY OF TEXAS SY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:AGIAN, SOS S.;CHERUKURI, RAVINDRANATH C.;AKOPIAN, DAVID;AND OTHERS;REEL/FRAME:019853/0558;SIGNING DATES FROM 20070816 TO 20070904

Owner name: THE BOARD OF REGENTS OF THE UNIVERSITY OF TEXAS SY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:AGIAN, SOS S.;CHERUKURI, RAVINDRANATH C.;AKOPIAN, DAVID;AND OTHERS;SIGNING DATES FROM 20070816 TO 20070904;REEL/FRAME:019853/0558

STCF Information on status: patent grant

Free format text: PATENTED CASE

CC Certificate of correction
FPAY Fee payment

Year of fee payment: 4

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2552); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment: 8

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

FEPP Fee payment procedure

Free format text: 11.5 YR SURCHARGE- LATE PMT W/IN 6 MO, SMALL ENTITY (ORIGINAL EVENT CODE: M2556); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2553); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment: 12